Re: [Xen-devel] [RFC 0/9] The Xen Blanket: hypervisor interface for PV drivers on nested Xen

2019-06-19 Thread Juergen Gross
On 20.06.19 02:30, Christopher Clark wrote: This RFC patch series adds a new hypervisor interface to support running a set of PV front end device drivers within dom0 of a guest Xen running on Xen. A practical deployment scenario is a system running PV guest VMs that use unmodified Xen PV device

[Xen-devel] [linux-linus test] 137986: regressions - FAIL

2019-06-19 Thread osstest service owner
flight 137986 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/137986/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-amd 12 guest-start/redhat.repeat fail REGR. vs. 133580 build-armhf

[Xen-devel] [xen-4.9-testing bisection] complete test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm

2019-06-19 Thread osstest service owner
branch xen-4.9-testing xenbranch xen-4.9-testing job test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm testid debian-hvm-install Tree: linux git://xenbits.xen.org/linux-pvops.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: ovmf git://xenbits.xen.org/osstest/ovmf.

[Xen-devel] [RFC 5/9] x86/nested, xsm: add nested_memory_op hypercall

2019-06-19 Thread Christopher Clark
Provides proxying to the host hypervisor for the XENMEM_add_to_physmap op only for the XENMAPSPACE_shared_info and XENMAPSPACE_grant_table spaces, for DOMID_SELF. Both compat and native entry points. Signed-off-by: Christopher Clark --- tools/flask/policy/modules/dom0.te | 1 + xen/arch/x86/g

[Xen-devel] [RFC 9/9] x86/nested, xsm: add nested_schedop_shutdown hypercall

2019-06-19 Thread Christopher Clark
Provides proxying to the host hypervisor for SCHEDOP_shutdown op. Signed-off-by: Christopher Clark --- tools/flask/policy/modules/dom0.te | 1 + xen/arch/x86/guest/hypercall_page.S | 1 + xen/arch/x86/guest/xen-nested.c | 25 + xen/arch/x86/hypercall.c|

[Xen-devel] [RFC 8/9] x86/nested, xsm: add nested_event_channel_op hypercall

2019-06-19 Thread Christopher Clark
Provides proxying to the host hypervisor for these event channel ops: * EVTCHNOP_alloc_unbound * EVTCHNOP_bind_vcpu * EVTCHNOP_close * EVTCHNOP_send * EVTCHNOP_unmask Introduces a new XSM access vector class for policy control applied to this operation: nested_event. This is required because

[Xen-devel] [RFC 6/9] x86/nested, xsm: add nested_hvm_op hypercall

2019-06-19 Thread Christopher Clark
Provides proxying to the host hypervisor for HVMOP_get_param and HVMOP_set_param ops. Signed-off-by: Christopher Clark --- tools/flask/policy/modules/dom0.te | 1 + xen/arch/x86/guest/hypercall_page.S | 1 + xen/arch/x86/guest/xen-nested.c | 42 + xen/arch/x86/

[Xen-devel] [RFC 3/9] x86/nested: add nested_xen_version hypercall

2019-06-19 Thread Christopher Clark
Provides proxying to the host hypervisor for XENVER_version and XENVER_get_features ops. The nested PV interface is only enabled when Xen is not running as either the PV shim or booted as PVH, since the initialization performed within the hypervisor in those cases - ie. as a Xen guest - claims res

[Xen-devel] [RFC 2/9] x86: Introduce Xen detection as separate logic from Xen Guest support.

2019-06-19 Thread Christopher Clark
Add Kconfig option XEN_DETECT for: "Support for Xen detecting when it is running under Xen". If running under Xen is detected, a boot message will indicate the hypervisor version obtained from cpuid. Update the XEN_GUEST Kconfig option text to reflect its current purpose: "Common PVH_GUEST and

[Xen-devel] [RFC 0/9] The Xen Blanket: hypervisor interface for PV drivers on nested Xen

2019-06-19 Thread Christopher Clark
This RFC patch series adds a new hypervisor interface to support running a set of PV front end device drivers within dom0 of a guest Xen running on Xen. A practical deployment scenario is a system running PV guest VMs that use unmodified Xen PV device drivers, on a guest Xen hypervisor with a dom0

[Xen-devel] [RFC 4/9] XSM: Add hook for nested xen version op; revises non-nested version op

2019-06-19 Thread Christopher Clark
Expand XSM control to the full set of Xen version ops, to allow for granular control over ops a domain is allowed to issue for the nested case. Applies const to args of xsm_default_action. Signed-off-by: Christopher Clark --- tools/flask/policy/modules/dom0.te | 7 ++- tools/flask/po

[Xen-devel] [RFC 7/9] x86/nested, xsm: add nested_grant_table_op hypercall

2019-06-19 Thread Christopher Clark
Provides proxying to the host hypervisor for the GNTTABOP_query_size op. Signed-off-by: Christopher Clark --- tools/flask/policy/modules/dom0.te | 1 + xen/arch/x86/guest/hypercall_page.S | 1 + xen/arch/x86/guest/xen-nested.c | 37 + xen/arch/x86/hypercall.c

[Xen-devel] [RFC 1/9] x86/guest: code movement to separate Xen detection from guest functions

2019-06-19 Thread Christopher Clark
Move some logic from: xen/arch/x86/guest/xen.c into a new file: xen/arch/x86/guest/xen-guest.c xen.c then contains the functions for basic Xen detection and xen-guest.c implements the intended behaviour changes when Xen is running as a guest. Since CONFIG_XEN_GUEST must currently be defined for a

[Xen-devel] [xen-unstable-smoke test] 138054: tolerable all pass - PUSHED

2019-06-19 Thread osstest service owner
flight 138054 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/138054/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [Xen-devel] Starting to port xen on beagleboard-x15 (GSoC 2019 project)

2019-06-19 Thread Julien Grall
Hi, On 6/19/19 11:06 PM, Denis Obrezkov wrote: (XEN) *** LOADING DOMAIN 0 *** (XEN) Missing kernel boot module? (XEN) (XEN) (XEN) Panic on CPU 0: (XEN) Could not set up DOM0 guest OS (XEN) You probably haven't set

Re: [Xen-devel] Starting to port xen on beagleboard-x15 (GSoC 2019 project)

2019-06-19 Thread Julien Grall
Hi, On 6/19/19 10:51 PM, Denis Obrezkov wrote: Hi, On 6/19/19 5:32 PM, Julien Grall wrote: Hi, On 19/06/2019 16:27, Andrii Anisov wrote: On 19.06.19 18:06, Julien Grall wrote: Lastly, please clean-up the code and send the patch on xen-devel. I will have a closer look at that time. Feel fr

Re: [Xen-devel] Starting to port xen on beagleboard-x15 (GSoC 2019 project)

2019-06-19 Thread Denis Obrezkov
Hi, On 6/19/19 5:06 PM, Julien Grall wrote: > > > On 19/06/2019 15:33, Denis Obrezkov wrote: >> Hi, > > Hi Denis, > >> ср, 19 июн. 2019 г. в 14:01, Andrii Anisov : >>> >>> >>> >>> On 18.06.19 19:19, Julien Grall wrote: Denis (the author of the thread) is doing a GSOC to port Xen on the >>

Re: [Xen-devel] [PATCH] xen/arm: fix build after 2e35cdf

2019-06-19 Thread Stefano Stabellini
On Wed, 19 Jun 2019, Julien Grall wrote: > On 6/19/19 10:47 PM, Stefano Stabellini wrote: > > On Wed, 19 Jun 2019, Julien Grall wrote: > > > Hi Stefano, > > > > > > Title: You should at least mention this is for op-tee. > > > > > > Also, mostly likely the sha1 is too small and likely to match mul

Re: [Xen-devel] [PATCH] xen/arm: fix build after 2e35cdf

2019-06-19 Thread Julien Grall
On 6/19/19 10:47 PM, Stefano Stabellini wrote: On Wed, 19 Jun 2019, Julien Grall wrote: Hi Stefano, Title: You should at least mention this is for op-tee. Also, mostly likely the sha1 is too small and likely to match multiple commit in the future. So you want to specify the title of the comm

Re: [Xen-devel] Starting to port xen on beagleboard-x15 (GSoC 2019 project)

2019-06-19 Thread Denis Obrezkov
Hi, On 6/19/19 5:32 PM, Julien Grall wrote: > Hi, > > On 19/06/2019 16:27, Andrii Anisov wrote: >> >> >> On 19.06.19 18:06, Julien Grall wrote: >>> Lastly, please clean-up the code and send the patch on xen-devel. I >>> will have a closer look at that time. Feel free to ping me on IRC if >>> you

Re: [Xen-devel] [PATCH] xen/arm: fix build after 2e35cdf

2019-06-19 Thread Stefano Stabellini
On Wed, 19 Jun 2019, Julien Grall wrote: > Hi Stefano, > > Title: You should at least mention this is for op-tee. > > Also, mostly likely the sha1 is too small and likely to match multiple commit > in the future. So you want to specify the title of the commit. > > On 6/19/19 10:24 PM, Stefano St

Re: [Xen-devel] [PATCH 3/4] xen/link: Fold .data.read_mostly into .data

2019-06-19 Thread Andrew Cooper
On 19/06/2019 22:28, Julien Grall wrote: > On 6/19/19 9:11 PM, Andrew Cooper wrote: >> .data.read_mostly only needs separating from adjacent data by one >> cache line >> to be effective, and placing it adjacent to .data.page_aligned >> fulfills this >> requirement. >> >> For ARM, .ex_table appears

[Xen-devel] [ovmf test] 137943: all pass - PUSHED

2019-06-19 Thread osstest service owner
flight 137943 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/137943/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 8a08dc5486f1a96c91b0ce86fc88a674ca0d8272 baseline version: ovmf a860eb9668c1a2ad87587

Re: [Xen-devel] [PATCH] xen/arm: fix build after 2e35cdf

2019-06-19 Thread Julien Grall
Hi Stefano, Title: You should at least mention this is for op-tee. Also, mostly likely the sha1 is too small and likely to match multiple commit in the future. So you want to specify the title of the commit. On 6/19/19 10:24 PM, Stefano Stabellini wrote: Optee breaks the build with: optee.c

Re: [Xen-devel] [PATCH 4/4] xen/link: Misc cleanup

2019-06-19 Thread Andrew Cooper
On 19/06/2019 22:30, Julien Grall wrote: > Hi, > > On 6/19/19 9:11 PM, Andrew Cooper wrote: >>   * Drop .gnu.warning.  Xen, not being a library, has no need for >>     __attribute__((__warning__("str"))) and isn't liable to ever gain >> such >>     annotations for link time warnings. > > What if th

[Xen-devel] [linux-4.19 test] 137925: regressions - FAIL

2019-06-19 Thread osstest service owner
flight 137925 linux-4.19 real [real] http://logs.test-lab.xenproject.org/osstest/logs/137925/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvops 6 kernel-build fail REGR. vs. 129313 Tests which did not

Re: [Xen-devel] [PATCH 4/4] xen/link: Misc cleanup

2019-06-19 Thread Julien Grall
Hi, On 6/19/19 9:11 PM, Andrew Cooper wrote: * Drop .gnu.warning. Xen, not being a library, has no need for __attribute__((__warning__("str"))) and isn't liable to ever gain such annotations for link time warnings. What if this is introduced? How do we catch it? * Adjust the ind

Re: [Xen-devel] [PATCH 3/4] xen/link: Fold .data.read_mostly into .data

2019-06-19 Thread Julien Grall
On 6/19/19 9:11 PM, Andrew Cooper wrote: .data.read_mostly only needs separating from adjacent data by one cache line to be effective, and placing it adjacent to .data.page_aligned fulfills this requirement. For ARM, .ex_table appears to be a vestigial remnant. Nothing in the resulting build

[Xen-devel] [PATCH] xen/arm: fix build after 2e35cdf

2019-06-19 Thread Stefano Stabellini
Optee breaks the build with: optee.c: In function ‘translate_noncontig.isra.4’: optee.c:743:38: error: ‘xen_data’ may be used uninitialized in this function [-Werror=maybe-uninitialized] xen_data->next_page_data = page_to_maddr(xen_pgs + 1); ^ op

Re: [Xen-devel] [PATCH 2/4] xen/link: Link .data.schedulers and CONSTRUCTERS in more appropriate locations

2019-06-19 Thread Julien Grall
Hi Andrew, On 6/19/19 9:11 PM, Andrew Cooper wrote: Neither of these should live in .data * .data.schedulers is only ever read, so is moved into .rodata * CONSTRUCTORS is only ever read, and only at boot, so is moved to beside .init.rodata Signed-off-by: Andrew Cooper --- CC: Jan Beul

Re: [Xen-devel] [PATCH 1/4] xen/link: Cope with .rodata.cst* sections

2019-06-19 Thread Julien Grall
Hi Andrew, On 6/19/19 9:11 PM, Andrew Cooper wrote: .rodata.cst* sections are used for mergable constant data, and the clang/llvm 8 toolchain has been observed to create .rodata.cst8 in a default Xen build. Unfortunately, this section (and its .init counterpart) aren't captured by Xen's linker

[Xen-devel] [xen-unstable-smoke test] 138039: tolerable all pass - PUSHED

2019-06-19 Thread osstest service owner
flight 138039 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/138039/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

[Xen-devel] [libvirt test] 137929: tolerable all pass - PUSHED

2019-06-19 Thread osstest service owner
flight 137929 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/137929/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 137736 test-armhf-armhf-libvirt-raw 13 saveresto

[Xen-devel] [xtf test] 137978: all pass - PUSHED

2019-06-19 Thread osstest service owner
flight 137978 xtf real [real] http://logs.test-lab.xenproject.org/osstest/logs/137978/ Perfect :-) All tests in this flight passed as required version targeted for testing: xtf 334e1935b99ca663c8808df5f545d996b19ee345 baseline version: xtf 5264341e4fb0bd69725416

[Xen-devel] [PATCH 4/4] xen/link: Misc cleanup

2019-06-19 Thread Andrew Cooper
* Drop .gnu.warning. Xen, not being a library, has no need for __attribute__((__warning__("str"))) and isn't liable to ever gain such annotations for link time warnings. * Adjust the indentation of the start of ARM's .rodata section. * Discard .discard on ARM. Signed-off-by: Andrew Coope

[Xen-devel] [PATCH 0/4] xen/link: Fixes and improvements to Xen's linking

2019-06-19 Thread Andrew Cooper
Patch 1 came from Roger's observation that a clang/llvm-8 binary doesn't actually boot. All other patches are ancillary cleanup. I'm afraid that I thing we still have further problems: andrewcoop@andrewcoop:/local/xen.git/xen$ readelf -WS xen-syms There are 23 section headers, starting at offset

[Xen-devel] [PATCH 2/4] xen/link: Link .data.schedulers and CONSTRUCTERS in more appropriate locations

2019-06-19 Thread Andrew Cooper
Neither of these should live in .data * .data.schedulers is only ever read, so is moved into .rodata * CONSTRUCTORS is only ever read, and only at boot, so is moved to beside .init.rodata Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Wei Liu CC: Roger Pau Monné CC: Stefano Stabell

[Xen-devel] [PATCH 1/4] xen/link: Cope with .rodata.cst* sections

2019-06-19 Thread Andrew Cooper
.rodata.cst* sections are used for mergable constant data, and the clang/llvm 8 toolchain has been observed to create .rodata.cst8 in a default Xen build. Unfortunately, this section (and its .init counterpart) aren't captured by Xen's linker globs, and end up as orphaned sections. Generalise the

[Xen-devel] [PATCH 3/4] xen/link: Fold .data.read_mostly into .data

2019-06-19 Thread Andrew Cooper
.data.read_mostly only needs separating from adjacent data by one cache line to be effective, and placing it adjacent to .data.page_aligned fulfills this requirement. For ARM, .ex_table appears to be a vestigial remnant. Nothing in the resulting build ever inspects or acts on the contents of the

Re: [Xen-devel] [PATCH] argo: suppress select logging messages

2019-06-19 Thread Christopher Clark
On Tue, Jun 18, 2019 at 1:10 PM Nicholas Tsirakis wrote: > > Some logging messages made more sense as argo debug > logs rather than standard Xen logs. Use argo_dprintk > to only print this info if argo DEBUG is enabled. > > Signed-off-by: Nicholas Tsirakis Reviewed-by: Christopher Clark > --- >

[Xen-devel] [xen-unstable test] 137917: regressions - FAIL

2019-06-19 Thread osstest service owner
flight 137917 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/137917/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt-xsm 7 xen-boot fail REGR. vs. 137724 test-amd64-i386-xl

[Xen-devel] [PATCH v7 2/5] tools/arm: optee: create optee firmware node in DT if tee=optee

2019-06-19 Thread Volodymyr Babchuk
If TEE support is enabled with "tee=optee" option in xl.cfg, then we need to inform guest about available TEE, by creating corresponding node in the guest's device tree. Signed-off-by: Volodymyr Babchuk Reviewed-by: Julien Grall Acked-by: Ian Jackson --- This patch depends on patches to optee

[Xen-devel] [PATCH v7 3/5] xen/arm: tee: place OP-TEE Kconfig option right after TEE

2019-06-19 Thread Volodymyr Babchuk
It is nicer, when options for particular TEE mediators (currently, OP-TEE only) are following generic "Enable TEE mediators support" option in the menuconfig: [*] Enable TEE mediators support [ ] Enable OP-TEE mediator Signed-off-by: Volodymyr Babchuk --- xen/arch/arm/Kconfig | 4 ++-- 1 fi

[Xen-devel] [PATCH v7 5/5] xen/arm: optee: document OPTEE option in tee/Kconfig

2019-06-19 Thread Volodymyr Babchuk
Add basic information about the OP-TEE mediator and note about dependency on virtualization-aware OP-TEE. Signed-off-by: Volodymyr Babchuk --- xen/arch/arm/tee/Kconfig | 5 + 1 file changed, 5 insertions(+) diff --git a/xen/arch/arm/tee/Kconfig b/xen/arch/arm/tee/Kconfig index 5b829db2e9..b

[Xen-devel] [PATCH v7 0/5] TEE mediator (and OP-TEE) support in XEN

2019-06-19 Thread Volodymyr Babchuk
Hello community, Please find new version of OP-TEE patch series. This is the kind of follow-up for the previous version, as most of the patches of the previous version were commited. This series includes leftovers of the prev. version and three new patches. One of the new patches adds a way to de

[Xen-devel] [PATCH v7 4/5] xen/arm: optee: check if OP-TEE is virtualization-aware

2019-06-19 Thread Volodymyr Babchuk
This is workaround for OP-TEE 3.5. This is the first OP-TEE release which supports virtualization, but there is no way to tell if OP-TEE was built with that support enabled. We can probe for it by calling SMC that is available only when OP-TEE is built with virtualization support. Signed-off-by: V

[Xen-devel] [PATCH v7 1/5] tools/arm: tee: add "tee" option for xl.cfg

2019-06-19 Thread Volodymyr Babchuk
This enumeration controls TEE type for a domain. Currently there is two possible options: either 'none' or 'optee'. 'none' is the default value and it basically disables TEE support at all. 'optee' enables access to the OP-TEE running on a host machine. This requires special OP-TEE build with vir

Re: [Xen-devel] Fwd: [xen-4.10-testing bisection] complete test-armhf-armhf-xl-arndale

2019-06-19 Thread Stefano Stabellini
On Wed, 19 Jun 2019, Julien Grall wrote: > > On 6/19/19 8:28 AM, Jan Beulich wrote: > > > > > > On 19.06.19 at 09:06, wrote: > > > > branch xen-4.10-testing > > > > xenbranch xen-4.10-testing > > > > job test-armhf-armhf-xl-arndale > > > > testid debian-install > > > > > > > > Tree: linux git://x

Re: [Xen-devel] Starting to port xen on beagleboard-x15 (GSoC 2019 project)

2019-06-19 Thread Julien Grall
On 19/06/2019 17:10, Andrii Anisov wrote: On 19.06.19 18:32, Julien Grall wrote: Regarding the placement of the code, I am still split between two minds (either head.S or a new specific .S for omap). However, this could be discussed once the patch is submitted. IMHO, that is a pure platfo

Re: [Xen-devel] [PATCH] AMD/IOMMU: revert "amd/iommu: assign iommu devices to Xen"

2019-06-19 Thread Woods, Brian
On Mon, Jun 03, 2019 at 07:00:25AM -0600, Jan Beulich wrote: > [CAUTION: External Email] > > This reverts commit b6bd02b7a877f9fac2de69e64d8245d56f92ab25. The change > was redundant with amd_iommu_detect_one_acpi() already calling > pci_ro_device(). > > Signed-off-by: Jan Beulich Acked-by: Bria

Re: [Xen-devel] [PATCH] x86/svm: Fix svm_vmcb_dump() when used in current context

2019-06-19 Thread Woods, Brian
On Mon, Jun 17, 2019 at 01:54:39PM +0100, Andy Cooper wrote: > VMExit doesn't switch all state. The FS/GS/TS/LDTR/GSBASE segment > information, and SYSCALL/SYSENTER MSRs may still be cached in hardware, rather > than up-to-date in the VMCB. > > Export svm_sync_vmcb() via svmdebug.h so svm_vmcb_du

Re: [Xen-devel] [PATCH 1/2] x86: init_hypercall_page() cleanup

2019-06-19 Thread Woods, Brian
On Thu, May 23, 2019 at 11:20:15AM +0100, Andy Cooper wrote: > [CAUTION: External Email] > > The various pieces of the hypercall page infrastructure have grown > organically over time and ended up in a bit of a mess. > > * Rename all functions to be of the form *_init_hypercall_page(). This >

Re: [Xen-devel] Starting to port xen on beagleboard-x15 (GSoC 2019 project)

2019-06-19 Thread Andrii Anisov
On 19.06.19 18:32, Julien Grall wrote: Regarding the placement of the code, I am still split between two minds (either head.S or a new specific .S for omap). However, this could be discussed once the patch is submitted. IMHO, that is a pure platform specific code. FMPOV it should be an inli

[Xen-devel] [qemu-mainline test] 137930: regressions - FAIL

2019-06-19 Thread osstest service owner
flight 137930 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/137930/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3866 xen-buildfail REGR. vs. 137600 build-i386-xsm

Re: [Xen-devel] [PATCH v3 13/13] print: introduce a format specifier for pci_sbdf_t

2019-06-19 Thread Woods, Brian
On Fri, Jun 07, 2019 at 11:22:32AM +0200, Roger Pau Monne wrote: > The new format specifier is '%pp', and prints a pci_sbdf_t using the > seg:bus:dev.func format. Replace all SBDFs printed using > '%04x:%02x:%02x.%u' to use the new format specifier. > > No functional change intended. > > Signed-o

Re: [Xen-devel] [PATCH v3 12/13] pci: switch pci_conf_write32 to use pci_sbdf_t

2019-06-19 Thread Woods, Brian
On Fri, Jun 07, 2019 at 11:22:31AM +0200, Roger Pau Monne wrote: > This reduces the number of parameters of the function to two, and > simplifies some of the calling sites. > > Signed-off-by: Roger Pau Monné As far as AMD IOMMU Acked-by: Brian Woods --- > Cc: Jan Beulich > Cc: Andrew Cooper

Re: [Xen-devel] [PATCH v3 09/13] pci: switch pci_conf_read32 to use pci_sbdf_t

2019-06-19 Thread Woods, Brian
On Fri, Jun 07, 2019 at 11:22:28AM +0200, Roger Pau Monne wrote: > This reduces the number of parameters of the function to two, and > simplifies some of the calling sites. > > Signed-off-by: Roger Pau Monné As far as AMD IOMMU Acked-by: Brian Woods --- > Cc: Jan Beulich > Cc: Andrew Cooper

Re: [Xen-devel] [PATCH v3 08/13] pci: switch pci_conf_read16 to use pci_sbdf_t

2019-06-19 Thread Woods, Brian
On Fri, Jun 07, 2019 at 11:22:27AM +0200, Roger Pau Monne wrote: > This reduces the number of parameters of the function to two, and > simplifies some of the calling sites. > > Signed-off-by: Roger Pau Monné As far as AMD IOMMU Acked-by: Brian Woods --- > Cc: Jan Beulich > Cc: Andrew Cooper

Re: [Xen-devel] [PATCH v3 07/13] pci: switch pci_conf_read8 to use pci_sbdf_t

2019-06-19 Thread Woods, Brian
On Fri, Jun 07, 2019 at 11:22:26AM +0200, Roger Pau Monne wrote: > This reduces the number of parameters of the function to two, and > simplifies some of the calling sites. > > Signed-off-by: Roger Pau Monné As far as AMD IOMMU Acked-by: Brian Woods > --- > Cc: Jan Beulich > Cc: Andrew Coope

Re: [Xen-devel] Fwd: [xen-4.10-testing bisection] complete test-armhf-armhf-xl-arndale

2019-06-19 Thread Julien Grall
Answering to myself. On 19/06/2019 10:02, Julien Grall wrote: Hi, On 6/19/19 8:28 AM, Jan Beulich wrote: On 19.06.19 at 09:06, wrote: branch xen-4.10-testing xenbranch xen-4.10-testing job test-armhf-armhf-xl-arndale testid debian-install Tree: linux git://xenbits.xen.org/linux-pvops.git Tr

Re: [Xen-devel] [PATCH 3/5] x86/AMD: make C-state handling independent of Dom0

2019-06-19 Thread Woods, Brian
On Wed, Jun 19, 2019 at 12:20:40AM -0600, Jan Beulich wrote: > >>> On 18.06.19 at 19:22, wrote: > > On Tue, Jun 11, 2019 at 06:42:33AM -0600, Jan Beulich wrote: > >> >>> On 10.06.19 at 18:28, wrote: > >> > On 23/05/2019 13:18, Jan Beulich wrote: > >> >> TBD: Can we set local_apic_timer_c2_ok to t

Re: [Xen-devel] [PATCH v6 03/10] xen/arm: optee: add OP-TEE mediator skeleton

2019-06-19 Thread Volodymyr Babchuk
Hi Julien, Julien Grall writes: > On 19/06/2019 12:01, Julien Grall wrote: >> Hi Volodymyr, >> >> On 11/06/2019 19:46, Volodymyr Babchuk wrote: >>> diff --git a/xen/arch/arm/tee/Kconfig b/xen/arch/arm/tee/Kconfig >>> new file mode 100644 >>> index 00..5b829db2e9 >>> --- /dev/null >>> +++

Re: [Xen-devel] Starting to port xen on beagleboard-x15 (GSoC 2019 project)

2019-06-19 Thread Julien Grall
Hi, On 19/06/2019 16:27, Andrii Anisov wrote: On 19.06.19 18:06, Julien Grall wrote: Lastly, please clean-up the code and send the patch on xen-devel. I will have a closer look at that time. Feel free to ping me on IRC if you have any doubt how to proceed. About the code: I think omap5_ini

[Xen-devel] [xen-unstable-smoke test] 138020: tolerable all pass - PUSHED

2019-06-19 Thread osstest service owner
flight 138020 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/138020/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [Xen-devel] Starting to port xen on beagleboard-x15 (GSoC 2019 project)

2019-06-19 Thread Andrii Anisov
On 19.06.19 18:06, Julien Grall wrote: Lastly, please clean-up the code and send the patch on xen-devel. I will have a closer look at that time. Feel free to ping me on IRC if you have any doubt how to proceed. About the code: I think omap5_init_secondary() must be moved to the platform co

Re: [Xen-devel] Starting to port xen on beagleboard-x15 (GSoC 2019 project)

2019-06-19 Thread Julien Grall
On 19/06/2019 15:33, Denis Obrezkov wrote: Hi, Hi Denis, ср, 19 июн. 2019 г. в 14:01, Andrii Anisov : On 18.06.19 19:19, Julien Grall wrote: Denis (the author of the thread) is doing a GSOC to port Xen on the BeagleBoard X15. You ended up CCed because you can provide feedback how to p

Re: [Xen-devel] [PATCH 3/4] x86/linker: add a reloc section to ELF binary

2019-06-19 Thread Roger Pau Monné
On Wed, Jun 19, 2019 at 06:57:05AM -0600, Jan Beulich wrote: > >>> On 19.06.19 at 13:02, wrote: > > If the hypervisor has been built with EFI support (ie: multiboot2). > > This allows to position the .reloc section correctly in the output > > binary, or else the linker might place .reloc before th

Re: [Xen-devel] [PATCH] MAINTAINERS: Add myself as a Designated reviewer to vm_event

2019-06-19 Thread Razvan Cojocaru
On 6/19/19 6:02 PM, Alexandru Stefan ISAILA wrote: Signed-off-by: Alexandru Isaila --- MAINTAINERS | 1 + 1 file changed, 1 insertion(+) diff --git a/MAINTAINERS b/MAINTAINERS index ab32e7f409..78e35012e0 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -412,6 +412,7 @@ F: unmodified_drivers/l

[Xen-devel] [PATCH] MAINTAINERS: Add myself as a Designated reviewer to vm_event

2019-06-19 Thread Alexandru Stefan ISAILA
Signed-off-by: Alexandru Isaila --- MAINTAINERS | 1 + 1 file changed, 1 insertion(+) diff --git a/MAINTAINERS b/MAINTAINERS index ab32e7f409..78e35012e0 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -412,6 +412,7 @@ F: unmodified_drivers/linux-2.6/ VM EVENT, MEM ACCESS and MONITOR M: R

Re: [Xen-devel] [PATCH v8 43/50] x86emul: support AVX512_VNNI insns

2019-06-19 Thread Andrew Cooper
On 15/03/2019 11:04, Jan Beulich wrote: > --- a/tools/tests/x86_emulator/x86-emulate.h > +++ b/tools/tests/x86_emulator/x86-emulate.h > @@ -144,6 +144,7 @@ static inline bool xcr0_mask(uint64_t ma > #define cpu_has_avx512vl (cp.feat.avx512vl && xcr0_mask(0xe6)) > #define cpu_has_avx512_vbmi (cp.

Re: [Xen-devel] [PATCH v8 42/50] x86emul: support AVX512_4VNNIW insns

2019-06-19 Thread Andrew Cooper
On 15/03/2019 11:04, Jan Beulich wrote: > As in a few cases before, since the insns here and in particular their > memory access patterns follow the AVX512_4FMAPS scheme, I didn't think > it was necessary to add contrived tests specifically for them, beyond > the Disp8 scaling ones. > > Signed-off-

Re: [Xen-devel] [PATCH v8 41/50] x86emul: support AVX512_4FMAPS insns

2019-06-19 Thread Andrew Cooper
On 15/03/2019 11:04, Jan Beulich wrote: > --- a/xen/arch/x86/x86_emulate/x86_emulate.c > +++ b/xen/arch/x86/x86_emulate/x86_emulate.c > @@ -1924,6 +1924,7 @@ static bool vcpu_has( > #define vcpu_has_avx512_bitalg() vcpu_has( 7, ECX, 12, ctxt, ops) > #define vcpu_has_avx512_vpopcntdq() vcpu_

Re: [Xen-devel] [PATCH 1/4] xz: use initconst for hypervisor build

2019-06-19 Thread Roger Pau Monné
On Wed, Jun 19, 2019 at 05:50:52AM -0600, Jan Beulich wrote: > >>> On 19.06.19 at 13:02, wrote: > > Or else clang adds a .init.rodata.cst8 section to the resulting object > > file, which is not handled by the Xen linker script and can end up > > before the text section which contains the headers,

Re: [Xen-devel] [PATCH 4/4] x86: check for multiboot{1, 2} header presence

2019-06-19 Thread Roger Pau Monné
On Wed, Jun 19, 2019 at 07:08:52AM -0600, Jan Beulich wrote: > >>> On 19.06.19 at 13:02, wrote: > > After building the hypervisor binary. Note that the check is performed > > by searching for the magic header value at the start of the binary. > > > > Signed-off-by: Roger Pau Monné > > --- > > Cc

Re: [Xen-devel] [PATCH 3/4] x86/linker: add a reloc section to ELF binary

2019-06-19 Thread Jan Beulich
>>> On 19.06.19 at 16:30, wrote: > On Wed, Jun 19, 2019 at 12:20:40PM +0100, Andrew Cooper wrote: >> Since the MB1/MB2 builds aren't relocatable, I think we might be able to >> get away with simply excluding them in the non-EFI build. > > Hm, OK. I'm slightly loss then. I've taken a look at the h

Re: [Xen-devel] Starting to port xen on beagleboard-x15 (GSoC 2019 project)

2019-06-19 Thread Denis Obrezkov
Hi, ср, 19 июн. 2019 г. в 14:01, Andrii Anisov : > > > > On 18.06.19 19:19, Julien Grall wrote: > > Denis (the author of the thread) is doing a GSOC to port Xen on the > > BeagleBoard X15. You ended up CCed because you can provide feedback how to > > proceed. Not because we wanted you to implemen

Re: [Xen-devel] [PATCH 3/4] x86/linker: add a reloc section to ELF binary

2019-06-19 Thread Roger Pau Monné
On Wed, Jun 19, 2019 at 12:20:40PM +0100, Andrew Cooper wrote: > On 19/06/2019 12:02, Roger Pau Monne wrote: > > If the hypervisor has been built with EFI support (ie: multiboot2). > > Seeing as this continues the sentence from the subject, it should start > without a capital.  Otherwise the resul

Re: [Xen-devel] [PATCH] swiotlb: fix phys_addr_t overflow warning

2019-06-19 Thread Konrad Rzeszutek Wilk
On Mon, Jun 17, 2019 at 09:13:16AM -0700, Stefano Stabellini wrote: > On Mon, 17 Jun 2019, Arnd Bergmann wrote: > > On architectures that have a larger dma_addr_t than phys_addr_t, > > the swiotlb_tbl_map_single() function truncates its return code > > in the failure path, making it impossible to i

[Xen-devel] [linux-4.9 test] 137906: regressions - FAIL

2019-06-19 Thread osstest service owner
flight 137906 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/137906/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-examine11 examine-serial/bootloader fail REGR. vs. 137639 test-amd64-i386-xl

Re: [Xen-devel] [PATCH 4/4] x86: check for multiboot{1, 2} header presence

2019-06-19 Thread Jan Beulich
>>> On 19.06.19 at 13:02, wrote: > After building the hypervisor binary. Note that the check is performed > by searching for the magic header value at the start of the binary. > > Signed-off-by: Roger Pau Monné > --- > Cc: Jan Beulich > Cc: Andrew Cooper > Cc: Wei Liu > --- > xen/arch/x86/Ma

[Xen-devel] [PATCH v1] Remove tools/examples/cpupool

2019-06-19 Thread Olaf Hering
In the near future all fresh installations will have an empty /etc. The content of this directory will not be controlled by the package manager anymore. One of the reasons for this move is to make snapshots more robust. Installing empty configuration files is not helpful for an empty /etc director

Re: [Xen-devel] [PATCH 3/4] x86/linker: add a reloc section to ELF binary

2019-06-19 Thread Jan Beulich
>>> On 19.06.19 at 13:02, wrote: > If the hypervisor has been built with EFI support (ie: multiboot2). > This allows to position the .reloc section correctly in the output > binary, or else the linker might place .reloc before the .text > section. > > Note that the .reloc section is moved before

Re: [Xen-devel] [PATCH v8 38/50] x86emul: support of AVX512* population count insns

2019-06-19 Thread Jan Beulich
>>> On 19.06.19 at 14:22, wrote: > On 15/03/2019 11:01, Jan Beulich wrote: >> --- a/xen/tools/gen-cpuid.py >> +++ b/xen/tools/gen-cpuid.py >> @@ -269,7 +269,7 @@ def crunch_numbers(state): >> # AVX512 extensions acting (solely) on vectors of bytes/words are >> made >> # dependen

Re: [Xen-devel] [PATCH v8 32/50] x86emul: support AVX512F gather insns

2019-06-19 Thread Jan Beulich
>>> On 19.06.19 at 14:05, wrote: > On 15/03/2019 10:58, Jan Beulich wrote: >> This requires getting modrm_reg and sib_index set correctly in the EVEX >> case, to account for the high 16 [XYZ]MM registers. Extend the >> adjustments to modrm_rm as well, such that x86_insn_modrm() would >> correctly

[Xen-devel] [PATCH v1] tools: remove empty xl.conf

2019-06-19 Thread Olaf Hering
In the near future all fresh installations will have an empty /etc. The content of this directory will not be controlled by the package manager anymore. One of the reasons for this move is to make snapshots more robust. Installing empty configuration files is not helpful for an empty /etc director

Re: [Xen-devel] [PATCH v8 40/50] x86emul: support remaining AVX512_VBMI2 insns

2019-06-19 Thread Andrew Cooper
On 15/03/2019 11:02, Jan Beulich wrote: > As in a few cases before, since the insns here and in particular their > memory access patterns follow the usual scheme, I didn't think it was > necessary to add a contrived test specifically for them, beyond the > Disp8 scaling one. > > Signed-off-by: Jan

Re: [Xen-devel] [PATCH v8 39/50] x86emul: support of AVX512_IFMA insns

2019-06-19 Thread Andrew Cooper
On 15/03/2019 11:02, Jan Beulich wrote: > Once again take the liberty and also correct the (public interface) name > of the AVX512_IFMA feature flag to match the SDM, on the assumption that > no external consumer has actually been using that flag so far. > > As in a few cases before, since the insn

Re: [Xen-devel] [PATCH v8 38/50] x86emul: support of AVX512* population count insns

2019-06-19 Thread Andrew Cooper
On 15/03/2019 11:01, Jan Beulich wrote: > --- a/xen/tools/gen-cpuid.py > +++ b/xen/tools/gen-cpuid.py > @@ -269,7 +269,7 @@ def crunch_numbers(state): > # AVX512 extensions acting (solely) on vectors of bytes/words are > made > # dependents of AVX512BW (as to requiring wider than

[Xen-devel] [PATCH v1] Remove tools/examples/README.incompatibilities

2019-06-19 Thread Olaf Hering
The referenced versions can not run staging anymore since a while. Signed-off-by: Olaf Hering --- tools/examples/Makefile | 1 - tools/examples/README.incompatibilities | 38 - 2 files changed, 39 deletions(-) delete mode 100644 tools/examples/RE

Re: [Xen-devel] [PATCH v8 37/50] x86emul: complete support of AVX512_VBMI insns

2019-06-19 Thread Andrew Cooper
On 15/03/2019 11:01, Jan Beulich wrote: > Also add testing of ones support for which was added before. Sadly gcc's > command line option naming is not in line with Intel's naming of the > feature, which makes it necessary to mis-name things in the test harness. > > Since the only new insn here and

Re: [Xen-devel] [PATCH v8 36/50] x86emul: support AVX512CD insns

2019-06-19 Thread Andrew Cooper
On 15/03/2019 11:00, Jan Beulich wrote: > Since the insns here and in particular their memory access patterns > follow the usual scheme I didn't think it was necessary to add > contrived tests specifically for them, beyond the Disp8 scaling ones. > > Signed-off-by: Jan Beulich Acked-by: Andrew Co

Re: [Xen-devel] [PATCH v8 33/50] x86emul: add high register S/G test cases

2019-06-19 Thread Andrew Cooper
On 15/03/2019 10:59, Jan Beulich wrote: > In order to verify that in particular the index register decoding works > correctly in the S/G emulation paths, add dedicated (64-bit only) cases > disallowing the compiler to use the lower registers. Other than in the > generic SIMD case, where occasional

[Xen-devel] [PATCH v1] tools: move scripts from etc to libexec

2019-06-19 Thread Olaf Hering
In the near future all fresh installations will have an empty /etc. The content of this directory will not be controlled by the package manager anymore. One of the reasons for this move is to make snapshots more robust. As a first step into this direction, move the hotplug scripts to libexec becau

Re: [Xen-devel] [PATCH v8 32/50] x86emul: support AVX512F gather insns

2019-06-19 Thread Andrew Cooper
On 15/03/2019 10:58, Jan Beulich wrote: > This requires getting modrm_reg and sib_index set correctly in the EVEX > case, to account for the high 16 [XYZ]MM registers. Extend the > adjustments to modrm_rm as well, such that x86_insn_modrm() would > correctly report register numbers (this was a late

Re: [Xen-devel] Starting to port xen on beagleboard-x15 (GSoC 2019 project)

2019-06-19 Thread Andrii Anisov
On 18.06.19 19:19, Julien Grall wrote: Denis (the author of the thread) is doing a GSOC to port Xen on the BeagleBoard X15. You ended up CCed because you can provide feedback how to proceed. Not because we wanted you to implement it... OK then. Denis, Feel free to contact me in case you n

Re: [Xen-devel] [PATCH 3/4] x86/linker: add a reloc section to ELF binary

2019-06-19 Thread Jan Beulich
>>> On 19.06.19 at 13:20, wrote: > On 19/06/2019 12:02, Roger Pau Monne wrote: >> Note that the .reloc section is moved before .bss for two reasons: in >> order for the resulting binary to not contain any section with data >> after .bss, so that the file size can be smaller than the loaded >> memo

Re: [Xen-devel] [PATCH 1/4] xz: use initconst for hypervisor build

2019-06-19 Thread Jan Beulich
>>> On 19.06.19 at 13:02, wrote: > Or else clang adds a .init.rodata.cst8 section to the resulting object > file, which is not handled by the Xen linker script and can end up > before the text section which contains the headers, thus resulting in > a not usable binary. To be honest I'd prefer if

Re: [Xen-devel] [PATCH 1/4] xz: use initconst for hypervisor build

2019-06-19 Thread Jan Beulich
>>> On 19.06.19 at 13:09, wrote: > On 19/06/2019 12:02, Roger Pau Monne wrote: >> Or else clang adds a .init.rodata.cst8 section to the resulting object >> file, which is not handled by the Xen linker script and can end up >> before the text section which contains the headers, thus resulting in >>

Re: [Xen-devel] [PATCH 4/4] x86: check for multiboot{1, 2} header presence

2019-06-19 Thread Andrew Cooper
On 19/06/2019 12:20, Roger Pau Monné wrote: > On Wed, Jun 19, 2019 at 12:11:43PM +0100, Andrew Cooper wrote: >> On 19/06/2019 12:02, Roger Pau Monne wrote: >>> After building the hypervisor binary. Note that the check is performed >>> by searching for the magic header value at the start of the bina

Re: [Xen-devel] [PATCH 3/4] x86/linker: add a reloc section to ELF binary

2019-06-19 Thread Andrew Cooper
On 19/06/2019 12:02, Roger Pau Monne wrote: > If the hypervisor has been built with EFI support (ie: multiboot2). Seeing as this continues the sentence from the subject, it should start without a capital.  Otherwise the result is werd to read. > This allows to position the .reloc section correctl

  1   2   >