Re: [PATCH 2/4] iommu/x86: introduce a generic IVMD/RMRR range validity helper

2024-02-07 Thread Roger Pau Monné
On Tue, Feb 06, 2024 at 12:17:29PM +0100, Jan Beulich wrote: > On 01.02.2024 18:01, Roger Pau Monne wrote: > > IVMD and RMRR ranges are functionally equivalent, and as so could use the > > same > > validity checker. > > May I suggest s/equivalent/similar/? Sure. > > Move the IVMD to x86 common

Re: [PATCH 4/4] iommu/x86: make unity range checking more strict

2024-02-07 Thread Roger Pau Monné
On Tue, Feb 06, 2024 at 12:49:08PM +0100, Jan Beulich wrote: > On 01.02.2024 18:01, Roger Pau Monne wrote: > > Currently when a unity range overlaps with memory being used as RAM by the > > hypervisor the result would be that the IOMMU gets disabled. However that's > > not enough, as even with

Re: [XEN PATCH v4 1/4] xen: add SAF deviation for debugging and logging effects

2024-02-07 Thread Simone Ballarin
On 06/02/24 13:04, Jan Beulich wrote: On 02.02.2024 16:16, Simone Ballarin wrote: Rule 13.1: Initializer lists shall not contain persistent side effects Effects caused by debug/logging macros and functions (like ASSERT, __bad_atomic_size, LOG, etc ...) that crash execution or produce logs are

[libvirt test] 184613: tolerable all pass - PUSHED

2024-02-07 Thread osstest service owner
flight 184613 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/184613/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 184573 test-armhf-armhf-libvirt-qcow2 15

Re: [PATCH v2 2/2] x86/p2m: aid the compiler in folding p2m_is_...()

2024-02-07 Thread Jan Beulich
On 07.02.2024 04:07, George Dunlap wrote: > On Thu, Feb 1, 2024 at 10:15 PM Jan Beulich wrote: >> On 01.02.2024 14:32, George Dunlap wrote: >>> On Thu, Jun 23, 2022 at 12:54 PM Jan Beulich wrote: >>> By using | instead of || or (in the negated form) && chances increase for the compiler

Re: [PATCH 3/4] iommu/vt-d: switch to common RMRR checker

2024-02-07 Thread Roger Pau Monné
On Tue, Feb 06, 2024 at 12:28:07PM +0100, Jan Beulich wrote: > On 01.02.2024 18:01, Roger Pau Monne wrote: > > Use the newly introduced generic unity map checker. > > > > Also drop the message recommending the usage of iommu_inclusive_mapping: the > > ranges would end up being mapped anyway even

Re: [XEN v4 1/3] xen/arm: Introduce CONFIG_PARTIAL_EMULATION and "partial-emulation" cmd option

2024-02-07 Thread Julien Grall
Hi Michal, On 07/02/2024 07:45, Michal Orzel wrote: On 06/02/2024 19:49, Julien Grall wrote: On 31/01/2024 12:10, Ayan Kumar Halder wrote: There can be situations when the registers cannot be emulated to their full functionality. This can be due to the complexity involved. In such cases, one

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Jürgen Groß
On 07.02.24 12:00, Samuel Thibault wrote: Jürgen Groß, le mer. 07 févr. 2024 11:42:20 +0100, a ecrit: while implementing kexec in Mini-OS. Oh, nice :D For that I need it for sure. It needs to be done by kexec itself then. That's another option, yes. The question is whether we want to

Re: [XEN PATCH v4 1/4] xen: add SAF deviation for debugging and logging effects

2024-02-07 Thread Simone Ballarin
On 07/02/24 11:24, Jan Beulich wrote: On 07.02.2024 11:03, Simone Ballarin wrote: On 06/02/24 13:04, Jan Beulich wrote: On 02.02.2024 16:16, Simone Ballarin wrote: Rule 13.1: Initializer lists shall not contain persistent side effects Effects caused by debug/logging macros and functions

[PATCH v6 7/7] (mostly) x86: add/convert entry point annotations

2024-02-07 Thread Jan Beulich
1: common: honor CONFIG_CC_SPLIT_SECTIONS also for assembly functions 2: SVM: convert entry point annotations 3: VMX: convert entry point annotations 4: x86/ACPI: annotate assembly functions with type and size 5: x86/kexec: convert entry point annotations 6: x86: convert misc assembly function

Re: [PATCH] config: update Mini-OS commit

2024-02-07 Thread Jürgen Groß
On 07.02.24 14:41, Julien Grall wrote: Hi Juergen, On 07/02/2024 13:31, Juergen Gross wrote: Update the Mini-OS upstream revision. Signed-off-by: Juergen Gross ---   Config.mk | 2 +-   1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Config.mk b/Config.mk index

[PATCH] Mini-OS: fix 9pfront fix

2024-02-07 Thread Juergen Gross
There was a typo in the recent 9pfront fix. Fixes: b119f0178fd8 ("Mini-OS: fix 9pfs frontend error path") Reported-by: Julien Grall Signed-off-by: Juergen Gross --- 9pfront.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/9pfront.c b/9pfront.c index 042879a7..1741d600

Re: [PATCH v6 5/7] x86/kexec: convert entry point annotations

2024-02-07 Thread Andrew Cooper
On 07/02/2024 1:38 pm, Jan Beulich wrote: > Use the generic framework from xen/linkage.h. > > Signed-off-by: Jan Beulich > --- > Using the linker script like this feels fragile. Maybe it's better to > suppress (#undef) CONFIG_CC_SPLIT_SECTIONS for this one file? This is specific glue code,

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Jürgen Groß
On 07.02.24 12:34, Samuel Thibault wrote: Jürgen Groß, le mer. 07 févr. 2024 12:16:44 +0100, a ecrit: On 07.02.24 12:00, Samuel Thibault wrote: Jürgen Groß, le mer. 07 févr. 2024 11:42:20 +0100, a ecrit: while implementing kexec in Mini-OS. Oh, nice :D For that I need it for sure. It

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Samuel Thibault
Jürgen Groß, le mer. 07 févr. 2024 12:43:03 +0100, a ecrit: > On 07.02.24 12:34, Samuel Thibault wrote: > > Jürgen Groß, le mer. 07 févr. 2024 12:16:44 +0100, a ecrit: > > > On 07.02.24 12:00, Samuel Thibault wrote: > > > > Jürgen Groß, le mer. 07 févr. 2024 11:42:20 +0100, a ecrit: > > > > >

Re: [XEN v4 1/3] xen/arm: Introduce CONFIG_PARTIAL_EMULATION and "partial-emulation" cmd option

2024-02-07 Thread Julien Grall
Hi Michal, On 07/02/2024 11:52, Michal Orzel wrote: On 07/02/2024 11:06, Julien Grall wrote: Hi Michal, On 07/02/2024 07:45, Michal Orzel wrote: On 06/02/2024 19:49, Julien Grall wrote: On 31/01/2024 12:10, Ayan Kumar Halder wrote: There can be situations when the registers cannot be

Re: [PATCH 1/4] block-common: Fix same_vm for no targets

2024-02-07 Thread Jan Beulich
On 06.02.2024 12:45, Anthony PERARD wrote: > On Thu, Feb 01, 2024 at 01:30:21PM -0500, Jason Andryuk wrote: >> same_vm is broken when the two main domains do not have targets. otvm >> and targetvm are both missing, which means they get set to -1 and then >> converted to empty strings: >> >>

[PATCH v6 7/7] x86: move ENTRY(), GLOBAL(), and ALIGN

2024-02-07 Thread Jan Beulich
... to boot code, limiting their scope and thus allowing to drop respective #undef-s from the linker script. Signed-off-by: Jan Beulich --- An obvious alternative would be to convert boot code right away too, but I think this has lower priority for now. --- v6: New. ---

Re: [PATCH] config: update Mini-OS commit

2024-02-07 Thread Julien Grall
Hi Juergen, On 07/02/2024 13:31, Juergen Gross wrote: Update the Mini-OS upstream revision. Signed-off-by: Juergen Gross --- Config.mk | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Config.mk b/Config.mk index f7d6d84847..077d841bb7 100644 --- a/Config.mk +++

Re: [PATCH v6 4/7] x86/ACPI: annotate assembly functions with type and size

2024-02-07 Thread Andrew Cooper
On 07/02/2024 1:37 pm, Jan Beulich wrote: > Use the generic framework from xen/linkage.h. > > Signed-off-by: Jan Beulich > --- > The .Lsuspend_err label is used in a cross-function manner here, but > it's not clear to me what - if anything - to do about this. Well - again like VMX, this is

[PATCH] hvmloader: suppress GNU ld 2.39 warning about RWX load segments

2024-02-07 Thread Jan Beulich
This aspect is simply meaningless for this component. Signed-off-by: Jan Beulich --- a/tools/firmware/hvmloader/Makefile +++ b/tools/firmware/hvmloader/Makefile @@ -20,6 +20,8 @@ XEN_ROOT = $(CURDIR)/../../.. include $(XEN_ROOT)/tools/firmware/Rules.mk +ld-option = $(shell if $(LD) -v $(1)

[PATCH] config: update Mini-OS commit

2024-02-07 Thread Juergen Gross
Update the Mini-OS upstream revision. Signed-off-by: Juergen Gross --- Config.mk | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Config.mk b/Config.mk index f7d6d84847..077d841bb7 100644 --- a/Config.mk +++ b/Config.mk @@ -224,7 +224,7 @@ QEMU_UPSTREAM_URL ?=

[PATCH v6 6/7] x86: convert misc assembly function annotations

2024-02-07 Thread Jan Beulich
Use the generic framework from xen/linkage.h. Signed-off-by: Jan Beulich --- v6: New. --- a/xen/arch/x86/clear_page.S +++ b/xen/arch/x86/clear_page.S @@ -1,8 +1,9 @@ .file __FILE__ +#include #include -ENTRY(clear_page_sse2) +FUNC(clear_page_sse2) mov $PAGE_SIZE/32,

[PATCH v6 5/7] x86/kexec: convert entry point annotations

2024-02-07 Thread Jan Beulich
Use the generic framework from xen/linkage.h. Signed-off-by: Jan Beulich --- Using the linker script like this feels fragile. Maybe it's better to suppress (#undef) CONFIG_CC_SPLIT_SECTIONS for this one file? --- v6: New. --- a/xen/arch/x86/x86_64/kexec_reloc.S +++

Re: [PATCH v6 2/7] SVM: convert entry point annotations

2024-02-07 Thread Andrew Cooper
On 07/02/2024 1:37 pm, Jan Beulich wrote: > Use the generic framework from xen/linkage.h. > > Signed-off-by: Jan Beulich Acked-by: Andrew Cooper

Re: [PATCH v6 6/7] x86: convert misc assembly function annotations

2024-02-07 Thread Andrew Cooper
On 07/02/2024 1:38 pm, Jan Beulich wrote: > --- a/xen/arch/x86/x86_64/entry.S > +++ b/xen/arch/x86/x86_64/entry.S > @@ -599,7 +599,7 @@ domain_crash_page_fault_0x8: > ALTERNATIVE "", clac, X86_FEATURE_XEN_SMAP > movq %rsi,%rdi > call show_page_walk >

Re: [XEN PATCH v4 1/4] xen: add SAF deviation for debugging and logging effects

2024-02-07 Thread Jan Beulich
On 07.02.2024 11:03, Simone Ballarin wrote: > On 06/02/24 13:04, Jan Beulich wrote: >> On 02.02.2024 16:16, Simone Ballarin wrote: >>> Rule 13.1: Initializer lists shall not contain persistent side effects >>> >>> Effects caused by debug/logging macros and functions (like ASSERT, >>>

Re: [PATCH 4/4] iommu/x86: make unity range checking more strict

2024-02-07 Thread Jan Beulich
On 07.02.2024 10:14, Roger Pau Monné wrote: > On Tue, Feb 06, 2024 at 12:49:08PM +0100, Jan Beulich wrote: >> On 01.02.2024 18:01, Roger Pau Monne wrote: >>> Currently when a unity range overlaps with memory being used as RAM by the >>> hypervisor the result would be that the IOMMU gets disabled.

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Samuel Thibault
Jürgen Groß, le mer. 07 févr. 2024 11:42:20 +0100, a ecrit: > while implementing kexec in Mini-OS. Oh, nice :D > For that I need it for sure. It needs to be done by kexec itself then. Samuel

Re: [XEN PATCH v4 3/4] xen/x86: address violations of MISRA C:2012 Rule 13.1

2024-02-07 Thread Simone Ballarin
On 06/02/24 14:13, Jan Beulich wrote: On 02.02.2024 16:16, Simone Ballarin wrote: Rule 13.1: Initializer lists shall not contain persistent side effects This patch moves expressions with side-effects into new variables before the initializer lists. No functional changes. Signed-off-by:

Re: xen | Failed pipeline for staging | f4519ee8

2024-02-07 Thread Jan Beulich
On 07.02.2024 15:02, GitLab wrote: > > > Pipeline #1167820960 has failed! > > Project: xen ( https://gitlab.com/xen-project/hardware/xen ) > Branch: staging ( > https://gitlab.com/xen-project/hardware/xen/-/commits/staging ) > > Commit: f4519ee8 ( >

Re: [PATCH v6 3/7] VMX: convert entry point annotations

2024-02-07 Thread Jan Beulich
On 07.02.2024 14:55, Andrew Cooper wrote: > On 07/02/2024 1:37 pm, Jan Beulich wrote: >> Use the generic framework from xen/linkage.h. >> >> Signed-off-by: Jan Beulich >> --- >> v6: New. >> >> --- a/xen/arch/x86/hvm/vmx/entry.S >> +++ b/xen/arch/x86/hvm/vmx/entry.S >> @@ -24,7 +24,7 @@ >>

Re: xen | Failed pipeline for staging | f4519ee8

2024-02-07 Thread Andrew Cooper
On 07/02/2024 2:20 pm, Jan Beulich wrote: > On 07.02.2024 15:02, GitLab wrote: >> >> Pipeline #1167820960 has failed! >> >> Project: xen ( https://gitlab.com/xen-project/hardware/xen ) >> Branch: staging ( >> https://gitlab.com/xen-project/hardware/xen/-/commits/staging ) >> >> Commit: f4519ee8 (

Re: [PATCH] hvmloader: suppress GNU ld 2.39 warning about RWX load segments

2024-02-07 Thread Andrew Cooper
On 07/02/2024 2:03 pm, Jan Beulich wrote: > This aspect is simply meaningless for this component. > > Signed-off-by: Jan Beulich In principle Acked-by: Andrew Cooper , but > > --- a/tools/firmware/hvmloader/Makefile > +++ b/tools/firmware/hvmloader/Makefile > @@ -20,6 +20,8 @@ > XEN_ROOT =

Re: [PATCH 3/4] iommu/vt-d: switch to common RMRR checker

2024-02-07 Thread Jan Beulich
On 07.02.2024 10:01, Roger Pau Monné wrote: > On Tue, Feb 06, 2024 at 12:28:07PM +0100, Jan Beulich wrote: >> On 01.02.2024 18:01, Roger Pau Monne wrote: >>> Use the newly introduced generic unity map checker. >>> >>> Also drop the message recommending the usage of iommu_inclusive_mapping: the >>>

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Samuel Thibault
Jürgen Groß, le mer. 07 févr. 2024 12:16:44 +0100, a ecrit: > On 07.02.24 12:00, Samuel Thibault wrote: > > Jürgen Groß, le mer. 07 févr. 2024 11:42:20 +0100, a ecrit: > > > while implementing kexec in Mini-OS. > > > > Oh, nice :D > > > > > For that I need it for sure. > > > > It needs to be

Re: [PATCH v6 0/7] (mostly) x86: add/convert entry point annotations

2024-02-07 Thread Jan Beulich
On 07.02.2024 14:34, Jan Beulich wrote: > 1: common: honor CONFIG_CC_SPLIT_SECTIONS also for assembly functions > 2: SVM: convert entry point annotations > 3: VMX: convert entry point annotations > 4: x86/ACPI: annotate assembly functions with type and size > 5: x86/kexec: convert entry point

Re: [PATCH v6 7/7] x86: move ENTRY(), GLOBAL(), and ALIGN

2024-02-07 Thread Andrew Cooper
On 07/02/2024 1:39 pm, Jan Beulich wrote: > ... to boot code, limiting their scope and thus allowing to drop > respective #undef-s from the linker script. > > Signed-off-by: Jan Beulich > --- > An obvious alternative would be to convert boot code right away too, but > I think this has lower

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Juergen Gross
On 07.02.24 11:39, Jan Beulich wrote: On 07.02.2024 11:31, Juergen Gross wrote: --- a/arch/x86/setup.c +++ b/arch/x86/setup.c @@ -184,6 +184,8 @@ arch_init(void *par) { static char hello[] = "Bootstrapping...\n"; + memset(&__bss_start, 0, &_end - &__bss_start); Doesn't /

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Andrew Cooper
On 07/02/2024 10:42 am, Jürgen Groß wrote: > On 07.02.24 11:38, Samuel Thibault wrote: >> Juergen Gross, le mer. 07 févr. 2024 11:31:38 +0100, a ecrit: >>> The .bss segment should be zeroed at very early boot. >> >> Is that not done by the elf loader of Xen? > > It might be done by Xen tools

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Jan Beulich
On 07.02.2024 11:42, Jürgen Groß wrote: > On 07.02.24 11:38, Samuel Thibault wrote: >> Juergen Gross, le mer. 07 févr. 2024 11:31:38 +0100, a ecrit: >>> The .bss segment should be zeroed at very early boot. >> >> Is that not done by the elf loader of Xen? > > It might be done by Xen tools today,

Re: [XEN PATCH v4 1/4] xen: add SAF deviation for debugging and logging effects

2024-02-07 Thread Jan Beulich
On 07.02.2024 13:21, Simone Ballarin wrote: > On 07/02/24 11:24, Jan Beulich wrote: >> On 07.02.2024 11:03, Simone Ballarin wrote: >>> On 06/02/24 13:04, Jan Beulich wrote: On 02.02.2024 16:16, Simone Ballarin wrote: > Rule 13.1: Initializer lists shall not contain persistent side effects

Re: [PATCH] config: update Mini-OS commit

2024-02-07 Thread Jan Beulich
On 07.02.2024 14:31, Juergen Gross wrote: > Update the Mini-OS upstream revision. > > Signed-off-by: Juergen Gross Acked-by: Jan Beulich

Re: [PATCH] Mini-OS: fix 9pfront fix

2024-02-07 Thread Samuel Thibault
Juergen Gross, le mer. 07 févr. 2024 14:49:20 +0100, a ecrit: > There was a typo in the recent 9pfront fix. > > Fixes: b119f0178fd8 ("Mini-OS: fix 9pfs frontend error path") > Reported-by: Julien Grall > Signed-off-by: Juergen Gross Reviewed-by: Samuel Thibault > --- > 9pfront.c | 2 +- > 1

Re: [XEN PATCH v2 2/3] x86/uaccess: replace __{get,put}_user_bad() with STATIC_ASSERT_UNREACHABLE()

2024-02-07 Thread Jan Beulich
On 07.02.2024 14:51, Federico Serafini wrote: > On 07/02/24 08:38, Jan Beulich wrote: >> On 07.02.2024 02:08, Stefano Stabellini wrote: >>> On Tue, 6 Feb 2024, Jan Beulich wrote: On 26.01.2024 11:05, Federico Serafini wrote: > @@ -208,7 +205,7 @@ do {

Re: xen | Failed pipeline for staging | f4519ee8

2024-02-07 Thread Anthony PERARD
On Wed, Feb 7, 2024 at 2:24 PM Andrew Cooper wrote: > >> Stage: test > >> Name: qemu-smoke-riscv64-gcc > > I have to admit that I can't connect what was pushed recently to this job > > failing. > > The qemu smoke tests for riscv and ppc intermittently fail on the > OSSTest-lab infrastructure in

Re: [PATCH] hvmloader: suppress GNU ld 2.39 warning about RWX load segments

2024-02-07 Thread Jan Beulich
On 07.02.2024 15:31, Andrew Cooper wrote: > On 07/02/2024 2:03 pm, Jan Beulich wrote: >> This aspect is simply meaningless for this component. >> >> Signed-off-by: Jan Beulich > > In principle Acked-by: Andrew Cooper , but > >> >> --- a/tools/firmware/hvmloader/Makefile >> +++

[PATCH v6 2/3] xen: use explicit function alignment if supported by compiler

2024-02-07 Thread Roger Pau Monne
Introduce a new Kconfig check for whether the compiler supports -falign-functions and if supported use it to align functions to the per-arch selected value, just like it's done for assembly ENTRY() and FUNC() symbols. Note that it's possible for the compiler to end up using a higher function

Re: [PATCH v2] tools/xentop: add option to display dom0 first

2024-02-07 Thread Anthony PERARD
On Tue, Feb 06, 2024 at 04:15:45PM +0100, zithro / Cyril Rébert wrote: > Add a command line option to xentop to be able to display dom0 first, on top > of the list. > This is unconditional, so sorting domains with the S option will also ignore > dom0. > > Signed-off-by: Cyril Rébert (zithro) >

Re: [XEN PATCH 1/9] x86/boot: choose AP stack based on APIC ID

2024-02-07 Thread Jan Beulich
On 14.11.2023 18:49, Krystian Hebel wrote: > --- a/xen/arch/x86/boot/trampoline.S > +++ b/xen/arch/x86/boot/trampoline.S > @@ -72,6 +72,26 @@ trampoline_protmode_entry: > mov $X86_CR4_PAE,%ecx > mov %ecx,%cr4 > > +/* > + * Get APIC ID while we're in

Re: xen | Failed pipeline for staging | f4519ee8

2024-02-07 Thread Andrew Cooper
On 07/02/2024 3:10 pm, Anthony PERARD wrote: > On Wed, Feb 7, 2024 at 2:55 PM Andrew Cooper > wrote: >> On 07/02/2024 2:34 pm, Anthony PERARD wrote: >>> On Wed, Feb 7, 2024 at 2:24 PM Andrew Cooper >>> wrote: >> Stage: test >> Name: qemu-smoke-riscv64-gcc > I have to admit that I

Re: [PATCH] tools/xentop: add option to display dom0 first

2024-02-07 Thread Anthony PERARD
On Tue, Feb 06, 2024 at 03:38:05PM +0100, zithro wrote: > On 05 Feb 2024 18:27, Anthony PERARD wrote: > > On Wed, Jan 31, 2024 at 06:51:34PM +0100, Cyril Rébert wrote: > > > Add a command line option to xentop to be able to display dom0 first, on > > > top of the list. > > > This is

Re: [XEN PATCH v2 2/3] x86/uaccess: replace __{get,put}_user_bad() with STATIC_ASSERT_UNREACHABLE()

2024-02-07 Thread Federico Serafini
On 07/02/24 16:24, Jan Beulich wrote: On 07.02.2024 16:08, Federico Serafini wrote: On 07/02/24 15:16, Jan Beulich wrote: On 07.02.2024 14:51, Federico Serafini wrote: On 07/02/24 08:38, Jan Beulich wrote: On 07.02.2024 02:08, Stefano Stabellini wrote: On Tue, 6 Feb 2024, Jan Beulich wrote:

Re: [XEN PATCH v2 2/3] x86/uaccess: replace __{get,put}_user_bad() with STATIC_ASSERT_UNREACHABLE()

2024-02-07 Thread Jan Beulich
On 07.02.2024 16:58, Federico Serafini wrote: > On 07/02/24 16:24, Jan Beulich wrote: >> On 07.02.2024 16:08, Federico Serafini wrote: >>> On 07/02/24 15:16, Jan Beulich wrote: On 07.02.2024 14:51, Federico Serafini wrote: > On 07/02/24 08:38, Jan Beulich wrote: >> On 07.02.2024

Re: [XEN PATCH 2/9] x86: don't access x86_cpu_to_apicid[] directly, use cpu_physical_id(cpu)

2024-02-07 Thread Jan Beulich
On 14.11.2023 18:49, Krystian Hebel wrote: > --- a/xen/arch/x86/apic.c > +++ b/xen/arch/x86/apic.c > @@ -950,7 +950,7 @@ __next: > */ > if (boot_cpu_physical_apicid == -1U) > boot_cpu_physical_apicid = get_apic_id(); > -x86_cpu_to_apicid[0] = get_apic_id(); > +

[PATCH v6 1/3] xen: introduce Kconfig function alignment option

2024-02-07 Thread Roger Pau Monne
And use it to replace CODE_ALIGN in assembly. This allows to generalize the way the code alignment gets set across all architectures. No functional change intended. Signed-off-by: Roger Pau Monné --- Changes since v5: - New in this version. --- xen/Kconfig | 17

[PATCH v6 3/3] xen/livepatch: align functions to ensure minimal distance between entry points

2024-02-07 Thread Roger Pau Monne
The minimal function size requirements for an x86 livepatch are either 5 bytes (for jmp) or 9 bytes (for endbr + jmp), and always 4 bytes on Arm. Ensure that distance between functions entry points is always at least of the minimal required size for livepatch instruction replacement to be

Re: xen | Failed pipeline for staging | f4519ee8

2024-02-07 Thread Andrew Cooper
On 07/02/2024 2:34 pm, Anthony PERARD wrote: > On Wed, Feb 7, 2024 at 2:24 PM Andrew Cooper > wrote: Stage: test Name: qemu-smoke-riscv64-gcc >>> I have to admit that I can't connect what was pushed recently to this job >>> failing. >> The qemu smoke tests for riscv and ppc

[PATCH v6 0/3] xen: introduce Kconfig function alignment option

2024-02-07 Thread Roger Pau Monne
Hello, The following series adds an additional Kconfig option for the per-arch code alignment. Such alignment is to be used in all assembly code symbols and C functions unless specified otherwise. Last patch also uses such alignment in order to guarantee enough distance between function entry

Re: [XEN PATCH v2 2/3] x86/uaccess: replace __{get,put}_user_bad() with STATIC_ASSERT_UNREACHABLE()

2024-02-07 Thread Federico Serafini
On 07/02/24 15:16, Jan Beulich wrote: On 07.02.2024 14:51, Federico Serafini wrote: On 07/02/24 08:38, Jan Beulich wrote: On 07.02.2024 02:08, Stefano Stabellini wrote: On Tue, 6 Feb 2024, Jan Beulich wrote: On 26.01.2024 11:05, Federico Serafini wrote: @@ -208,7 +205,7 @@ do {

Re: [XEN PATCH 3/9] x86/smp: drop x86_cpu_to_apicid, use cpu_data[cpu].apicid instead

2024-02-07 Thread Jan Beulich
On 02.02.2024 19:11, Julien Grall wrote: > Hi, > > On 14/11/2023 17:50, Krystian Hebel wrote: >> Both fields held the same data. >> >> Signed-off-by: Krystian Hebel >> --- >> xen/arch/x86/boot/x86_64.S | 8 +--- >> xen/arch/x86/include/asm/asm_defns.h | 2 +- >>

Re: xen | Failed pipeline for staging | f4519ee8

2024-02-07 Thread Anthony PERARD
On Wed, Feb 7, 2024 at 2:55 PM Andrew Cooper wrote: > > On 07/02/2024 2:34 pm, Anthony PERARD wrote: > > On Wed, Feb 7, 2024 at 2:24 PM Andrew Cooper > > wrote: > Stage: test > Name: qemu-smoke-riscv64-gcc > >>> I have to admit that I can't connect what was pushed recently to this job

Re: hvmloader - allow_memory_relocate overlaps

2024-02-07 Thread Jan Beulich
On 04.01.2024 14:16, Jan Beulich wrote: > On 22.12.2023 16:49, Neowutran wrote: >> Full logs without my patch to set allow-memory-relocate >> (https://github.com/neowutran/qubes-vmm-xen/blob/allowmemoryrelocate/ALLOWMEMORYRELOCATE.patch) >> https://pastebin.com/g >> QGg55WZ >> (GPU passthrough

Re: [XEN PATCH 4/9] x86/smp: move stack_base to cpu_data

2024-02-07 Thread Jan Beulich
On 14.11.2023 18:50, Krystian Hebel wrote: > --- a/xen/arch/x86/boot/x86_64.S > +++ b/xen/arch/x86/boot/x86_64.S > @@ -33,9 +33,8 @@ ENTRY(__high_start) > cmp %esp, CPUINFO_X86_apicid(%rcx) > jne 1b > > -/* %eax is now Xen CPU index. */ > -lea

Re: [XEN PATCH v2 2/3] x86/uaccess: replace __{get,put}_user_bad() with STATIC_ASSERT_UNREACHABLE()

2024-02-07 Thread Jan Beulich
On 07.02.2024 16:08, Federico Serafini wrote: > On 07/02/24 15:16, Jan Beulich wrote: >> On 07.02.2024 14:51, Federico Serafini wrote: >>> On 07/02/24 08:38, Jan Beulich wrote: On 07.02.2024 02:08, Stefano Stabellini wrote: > On Tue, 6 Feb 2024, Jan Beulich wrote: >> On 26.01.2024

[PATCH v2 2/2] iommu/vt-d: switch to common RMRR checker

2024-02-07 Thread Roger Pau Monne
Use the newly introduced generic unity map checker. Also drop the message recommending the usage of iommu_inclusive_mapping: the ranges would end up being mapped anyway even if some of the checks above failed, regardless of whether iommu_inclusive_mapping is set. Plus such option is not

[PATCH v2 1/2] iommu/x86: introduce a generic IVMD/RMRR range validity helper

2024-02-07 Thread Roger Pau Monne
IVMD and RMRR ranges are functionally equivalent, and as so could use the same validity checker. Move the IVMD to x86 common IOMMU code and adjust the function to take a pair of [start, end] mfn parameters. So far only the AMD-Vi side is adjusted to use the newly introduced helper, the VT-d side

[PATCH v2 0/2] iommu/x86: unify RMRR/IVMD range checks

2024-02-07 Thread Roger Pau Monne
Hello, The following patches unify the check for the RMRR/IVMD ranges in a common function, using the IVMD as the basis. Thanks, Roger. Roger Pau Monne (2): iommu/x86: introduce a generic IVMD/RMRR range validity helper iommu/vt-d: switch to common RMRR checker

[xen-unstable-smoke test] 184616: tolerable all pass - PUSHED

2024-02-07 Thread osstest service owner
flight 184616 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/184616/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

[PATCH v3] tools/xentop: add option to display dom0 first

2024-02-07 Thread zithro / Cyril Rébert
From: Cyril Rébert Add a command line option to xentop to be able to display dom0 first, on top of the list. This is unconditional, so sorting domains with the S option will also ignore dom0. Signed-off-by: Cyril Rébert (zithro) --- Changes in v3: (none, just reformatting patch correctly ...

[linux-linus test] 184614: tolerable FAIL - PUSHED

2024-02-07 Thread osstest service owner
flight 184614 linux-linus real [real] flight 184618 linux-linus real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/184614/ http://logs.test-lab.xenproject.org/osstest/logs/184618/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking):

[PATCH 1/3] tools/xg: Move xc_cpu_policy_t to xenguest.h

2024-02-07 Thread Alejandro Vallejo
This enables a set of follow-up simplifications in the toolstack. No functional change. Signed-off-by: Alejandro Vallejo --- tools/include/xenguest.h | 8 +++- tools/libs/guest/xg_private.h| 10 -- xen/include/xen/lib/x86/cpu-policy.h | 6 -- 3 files

[PATCH 3/3] tools/xg: Clean up xend-style overrides for CPU policies

2024-02-07 Thread Alejandro Vallejo
Factor out policy getters/setters from both (CPUID and MSR) policy override functions. Additionally, use host policy rather than featureset when preparing the cur policy, saving one hypercall and several lines of boilerplate. No functional change intended. Signed-off-by: Alejandro Vallejo ---

[PATCH 2/3] tools/xg: Streamline cpu policy serialise/deserialise calls

2024-02-07 Thread Alejandro Vallejo
The idea is to use xc_cpu_policy_t as a single object containing both the serialised and deserialised forms of the policy. Note that we need lengths for the arrays, as the serialised policies may be shorter than the array capacities. * Add the serialised lengths to the struct so we can

[PATCH 0/3] Clean the policy manipulation path in domain creation

2024-02-07 Thread Alejandro Vallejo
In the context of creating a domain, we currently issue a lot of hypercalls redundantly while populating its CPU policy; likely a side effect of organic growth more than anything else. However, the worst part is not the overhead (this is a glacially cold path), but the insane amounts of

Re: [XEN PATCH 5/9] x86/smp: call x2apic_ap_setup() earlier

2024-02-07 Thread Jan Beulich
On 14.11.2023 18:50, Krystian Hebel wrote: > It used to be called from smp_callin(), however BUG_ON() was invoked on > multiple occasions before that. It may end up calling machine_restart() > which tries to get APIC ID for CPU running this code. If BSP detected > that x2APIC is enabled,

[PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Juergen Gross
The .bss segment should be zeroed at very early boot. While adding the extern declaration of __bss_start for x86, make it together with the other linker table defined section boundaries common for all architectures. Signed-off-by: Juergen Gross --- arch/x86/setup.c | 2 ++

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Samuel Thibault
Juergen Gross, le mer. 07 févr. 2024 11:31:38 +0100, a ecrit: > The .bss segment should be zeroed at very early boot. Is that not done by the elf loader of Xen? > While adding the extern declaration of __bss_start for x86, make it > together with the other linker table defined section boundaries

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Jan Beulich
On 07.02.2024 11:31, Juergen Gross wrote: > --- a/arch/x86/setup.c > +++ b/arch/x86/setup.c > @@ -184,6 +184,8 @@ arch_init(void *par) > { > static char hello[] = "Bootstrapping...\n"; > > + memset(&__bss_start, 0, &_end - &__bss_start); Doesn't / shouldn't the loader guarantee this?

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Jan Beulich
On 07.02.2024 11:46, Juergen Gross wrote: > On 07.02.24 11:39, Jan Beulich wrote: >> On 07.02.2024 11:31, Juergen Gross wrote: >>> --- a/arch/x86/setup.c >>> +++ b/arch/x86/setup.c >>> @@ -184,6 +184,8 @@ arch_init(void *par) >>> { >>> static char hello[] = "Bootstrapping...\n"; >>> >>> +

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Jürgen Groß
On 07.02.24 13:02, Samuel Thibault wrote: Jürgen Groß, le mer. 07 févr. 2024 12:43:03 +0100, a ecrit: On 07.02.24 12:34, Samuel Thibault wrote: Jürgen Groß, le mer. 07 févr. 2024 12:16:44 +0100, a ecrit: On 07.02.24 12:00, Samuel Thibault wrote: Jürgen Groß, le mer. 07 févr. 2024 11:42:20

[xen-unstable test] 184612: tolerable FAIL - PUSHED

2024-02-07 Thread osstest service owner
flight 184612 xen-unstable real [real] flight 184615 xen-unstable real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/184612/ http://logs.test-lab.xenproject.org/osstest/logs/184615/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking):

[PATCH v6 1/7] common: honor CONFIG_CC_SPLIT_SECTIONS also for assembly functions

2024-02-07 Thread Jan Beulich
Leverage the new infrastructure in xen/linkage.h to also switch to per- function sections (when configured), deriving the specific name from the "base" section in use at the time FUNC() is invoked. Signed-off-by: Jan Beulich --- TBD: Since we use .subsection in UNLIKELY_START(), a perhaps not

[PATCH v6 2/7] SVM: convert entry point annotations

2024-02-07 Thread Jan Beulich
Use the generic framework from xen/linkage.h. Signed-off-by: Jan Beulich --- v6: New. --- a/xen/arch/x86/hvm/svm/entry.S +++ b/xen/arch/x86/hvm/svm/entry.S @@ -24,7 +24,7 @@ #include #include -ENTRY(svm_asm_do_resume) +FUNC(svm_asm_do_resume) GET_CURRENT(bx) .Lsvm_do_resume:

[PATCH v6 4/7] x86/ACPI: annotate assembly functions with type and size

2024-02-07 Thread Jan Beulich
Use the generic framework from xen/linkage.h. Signed-off-by: Jan Beulich --- The .Lsuspend_err label is used in a cross-function manner here, but it's not clear to me what - if anything - to do about this. --- v6: New. --- a/xen/arch/x86/acpi/wakeup_prot.S +++ b/xen/arch/x86/acpi/wakeup_prot.S

[PATCH v6 3/7] VMX: convert entry point annotations

2024-02-07 Thread Jan Beulich
Use the generic framework from xen/linkage.h. Signed-off-by: Jan Beulich --- v6: New. --- a/xen/arch/x86/hvm/vmx/entry.S +++ b/xen/arch/x86/hvm/vmx/entry.S @@ -24,7 +24,7 @@ #define VMRESUME .byte 0x0f,0x01,0xc3 #define VMLAUNCH .byte 0x0f,0x01,0xc2 -ENTRY(vmx_asm_vmexit_handler)

Re: [PATCH] Mini-OS: x86: zero out .bss segment at boot

2024-02-07 Thread Jürgen Groß
On 07.02.24 11:38, Samuel Thibault wrote: Juergen Gross, le mer. 07 févr. 2024 11:31:38 +0100, a ecrit: The .bss segment should be zeroed at very early boot. Is that not done by the elf loader of Xen? It might be done by Xen tools today, but I'm quite sure it is not part of the ABI. The

Re: [XEN v4 1/3] xen/arm: Introduce CONFIG_PARTIAL_EMULATION and "partial-emulation" cmd option

2024-02-07 Thread Michal Orzel
On 07/02/2024 11:06, Julien Grall wrote: > > > Hi Michal, > > On 07/02/2024 07:45, Michal Orzel wrote: >> On 06/02/2024 19:49, Julien Grall wrote: >>> On 31/01/2024 12:10, Ayan Kumar Halder wrote: There can be situations when the registers cannot be emulated to their full

Re: [XEN PATCH v2 2/3] x86/uaccess: replace __{get,put}_user_bad() with STATIC_ASSERT_UNREACHABLE()

2024-02-07 Thread Federico Serafini
On 07/02/24 08:38, Jan Beulich wrote: On 07.02.2024 02:08, Stefano Stabellini wrote: On Tue, 6 Feb 2024, Jan Beulich wrote: On 26.01.2024 11:05, Federico Serafini wrote: @@ -208,7 +205,7 @@ do { \ case 8:

Re: [PATCH v6 3/7] VMX: convert entry point annotations

2024-02-07 Thread Andrew Cooper
On 07/02/2024 1:37 pm, Jan Beulich wrote: > Use the generic framework from xen/linkage.h. > > Signed-off-by: Jan Beulich > --- > v6: New. > > --- a/xen/arch/x86/hvm/vmx/entry.S > +++ b/xen/arch/x86/hvm/vmx/entry.S > @@ -24,7 +24,7 @@ > #define VMRESUME .byte 0x0f,0x01,0xc3 > #define

Re: [PATCH 1/4] block-common: Fix same_vm for no targets

2024-02-07 Thread Jason Andryuk
On Wed, Feb 7, 2024 at 7:50 AM Jan Beulich wrote: > > On 06.02.2024 12:45, Anthony PERARD wrote: > > On Thu, Feb 01, 2024 at 01:30:21PM -0500, Jason Andryuk wrote: > >> same_vm is broken when the two main domains do not have targets. otvm > >> and targetvm are both missing, which means they get

Re: [PATCH] x86/altp2m: p2m_altp2m_get_or_propagate() should honor ap2m->default_access

2024-02-07 Thread Andrew Cooper
On 07/02/2024 1:18 am, George Dunlap wrote: > On Tue, Feb 6, 2024 at 6:08 PM Petr Beneš wrote: >> From: Petr Beneš >> >> This patch addresses a behavior discrepancy in the handling of altp2m views, >> where upon the creation and subsequent EPT violation, the page access >> permissions were

[PATCH] tools/ocaml: Add missing vmtrace_buf_kb field

2024-02-07 Thread Petr Beneš
From: Petr Beneš Add the missing `vmtrace_buf_kb` field to the OCaml bindings to match the vm.cfg configuration, correcting an oversight from its initial introduction. Signed-off-by: Petr Beneš --- tools/ocaml/libs/xc/xenctrl.ml | 1 + tools/ocaml/libs/xc/xenctrl.mli | 1 +

[ovmf test] 184619: all pass - PUSHED

2024-02-07 Thread osstest service owner
flight 184619 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/184619/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 4d1f0babe20cf757897fa43c399fd79bb6aa8a30 baseline version: ovmf

[linux-linus test] 184620: regressions - trouble: broken/fail/pass

2024-02-07 Thread osstest service owner
flight 184620 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/184620/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-multivcpu broken test-armhf-armhf-xl-multivcpu 5

Re: [PATCH v2 1/2] x86/p2m: make p2m_get_page_from_gfn() handle grant case correctly

2024-02-07 Thread George Dunlap
On Thu, Jun 23, 2022 at 7:54 PM Jan Beulich wrote: > Grant P2M entries, which are covered by p2m_is_any_ram(), wouldn't pass > the get_page() unless the grant was a local one. These need to take the > same path as foreign entries. Just the assertion there is not valid for > local grants, and

Re: [PATCH] x86/altp2m: p2m_altp2m_get_or_propagate() should honor ap2m->default_access

2024-02-07 Thread George Dunlap
On Thu, Feb 8, 2024 at 9:21 AM Tamas K Lengyel wrote: > > On Wed, Feb 7, 2024 at 5:21 PM Andrew Cooper > wrote: > > > > On 07/02/2024 1:18 am, George Dunlap wrote: > > > On Tue, Feb 6, 2024 at 6:08 PM Petr Beneš wrote: > > >> From: Petr Beneš > > >> > > >> This patch addresses a behavior

Re: [PATCH v4 05/32] tools/xen-9pfsd: add 9pfs response generation support

2024-02-07 Thread Jason Andryuk
On Mon, Feb 5, 2024 at 5:50 AM Juergen Gross wrote: > > Add support for generation a 9pfs protocol response via a format based > approach. > > Strings are stored in a per device string buffer and they are > referenced via their offset in this buffer. This allows to avoid > having to dynamically

Re: [PATCH v4 08/32] tools/xen-9pfsd: add 9pfs walk request support

2024-02-07 Thread Jason Andryuk
On Mon, Feb 5, 2024 at 5:59 AM Juergen Gross wrote: > > Add the walk request of the 9pfs protocol. > > Signed-off-by: Juergen Gross > Acked-by: Anthony PERARD Reviewed-by: Jason Andryuk

Re: [PATCH v4 02/32] tools: add a new xen logging daemon

2024-02-07 Thread Andrew Cooper
On 05/02/2024 10:49 am, Juergen Gross wrote: > Add "xen-9pfsd", a new logging daemon meant to support infrastructure > domains (e.g. xenstore-stubdom) to access files in dom0. I was still expecting for "logging" to disappear from this. In both cases it could just be deleted the sentences still

  1   2   >