[Xen-devel] [ovmf test] 139371: all pass - PUSHED

2019-07-26 Thread osstest service owner
flight 139371 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/139371/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf d47b85a621add591212546b12945d7b9873fbabf baseline version: ovmf

[Xen-devel] [xen-4.12-testing test] 139366: regressions - FAIL

2019-07-26 Thread osstest service owner
flight 139366 xen-4.12-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/139366/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-credit2 7 xen-boot fail REGR. vs. 139177

Re: [Xen-devel] [PATCH 1/4] arm/percpu: Move {get, set}_processor_id() into smp.h

2019-07-26 Thread Andrew Cooper
On 26/07/2019 23:30, Julien Grall wrote: > Hi Andrew, > > Thank you for looking into this. > > On 7/26/19 10:08 PM, Andrew Cooper wrote: >> For cleanup purposes, it is necessary for asm/percpu.h to not use >> DECLARE_PER_CPU() itself. asm/smp.h is arguably a better place for it to >> live anyway.

Re: [Xen-devel] [PATCH 4/4] xen/percpu: Make DECLARE_PER_CPU() and __DEFINE_PER_CPU() common

2019-07-26 Thread Julien Grall
Hi Andrew, On 7/26/19 10:08 PM, Andrew Cooper wrote: These macros are identical across the architectures, and shouldn't be separate from the DEFINE_PER_CPU*() infrastructure. This converts the final asm/percpu.h includes, which were all using DECLARE_PER_CPU(), to include xen/percpu.h instead.

Re: [Xen-devel] [PATCH 3/4] xen/percpu: Drop unused asm/percpu.h includes

2019-07-26 Thread Julien Grall
Hi Andrew, On 7/26/19 10:08 PM, Andrew Cooper wrote: These files either don't use any PER_CPU() infrastructure at all, or use DEFINE_PER_CPU_*(). This is declared in xen/percpu.h, not asm/percpu.h, which means that xen/percpu.h is included via a different path. Signed-off-by: Andrew Cooper

Re: [Xen-devel] [PATCH 1/4] arm/percpu: Move {get, set}_processor_id() into smp.h

2019-07-26 Thread Julien Grall
Hi Andrew, Thank you for looking into this. On 7/26/19 10:08 PM, Andrew Cooper wrote: > For cleanup purposes, it is necessary for asm/percpu.h to not use > DECLARE_PER_CPU() itself. asm/smp.h is arguably a better place for it to > live anyway. I have noticed that a lot of arch helpers called by

[Xen-devel] [PATCH] tools: ipxe: update for fixing build with GCC9

2019-07-26 Thread Dario Faggioli
Building with GCC9 (on openSUSE Tubmleweed) generates a lot of errors of the "taking address of packed member of ... may result in an unaligned pointer value" kind. Updating to upstream commit 1dd56dbd11082 ("[build] Workaround compilation error with gcc 9.1") seems to fix the problem. For more

Re: [Xen-devel] [PATCH v2 1/2] xen/link: Introduce .bss.percpu.page_aligned

2019-07-26 Thread Julien Grall
Hi Andrew, On 7/26/19 9:32 PM, Andrew Cooper wrote: Future changes are going to need to page align some percpu data. This means that the percpu area needs suitably aligning in the BSS so CPU0 has correctly aligned data. Shuffle the exact link order of items within the BSS to give

[Xen-devel] [PATCH 0/4] xen/percpu: Cleanup

2019-07-26 Thread Andrew Cooper
This is all cleanup which I got tangled in as part of the TSS xpti v2 fix, before deciding that this is far too invasive to backport, whereas the TSS fix itself really does want backporting. This series is based on:

[Xen-devel] [PATCH 3/4] xen/percpu: Drop unused asm/percpu.h includes

2019-07-26 Thread Andrew Cooper
These files either don't use any PER_CPU() infrastructure at all, or use DEFINE_PER_CPU_*(). This is declared in xen/percpu.h, not asm/percpu.h, which means that xen/percpu.h is included via a different path. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Wei Liu CC: Roger Pau Monné

[Xen-devel] [PATCH 4/4] xen/percpu: Make DECLARE_PER_CPU() and __DEFINE_PER_CPU() common

2019-07-26 Thread Andrew Cooper
These macros are identical across the architectures, and shouldn't be separate from the DEFINE_PER_CPU*() infrastructure. This converts the final asm/percpu.h includes, which were all using DECLARE_PER_CPU(), to include xen/percpu.h instead. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC:

[Xen-devel] [PATCH 2/4] xen/percpu: Drop unused xen/percpu.h includes

2019-07-26 Thread Andrew Cooper
None of these headers use any PER_CPU() infrastructure. xen/rwlock.h however does, and picked it up transitively via xen/spinlock.h, so include it properly. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Wei Liu CC: Roger Pau Monné CC: Stefano Stabellini CC: Julien Grall CC:

[Xen-devel] [PATCH 1/4] arm/percpu: Move {get, set}_processor_id() into smp.h

2019-07-26 Thread Andrew Cooper
For cleanup purposes, it is necessary for asm/percpu.h to not use DECLARE_PER_CPU() itself. asm/smp.h is arguably a better place for it to live anyway. Signed-off-by: Andrew Cooper --- CC: Stefano Stabellini CC: Julien Grall CC: Volodymyr Babchuk --- xen/include/asm-arm/percpu.h | 6 --

[Xen-devel] [xen-unstable test] 139364: regressions - FAIL

2019-07-26 Thread osstest service owner
flight 139364 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/139364/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-examine11 examine-serial/bootloader fail REGR. vs. 139342 Tests which did

[Xen-devel] [PATCH v2 0/2] x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown

2019-07-26 Thread Andrew Cooper
Reworked to allow DEFINE_PER_CPU_PAGE_ALIGNED() to specify the __aligned(PAGE_SIZE) itself. Andrew Cooper (2): xen/link: Introduce .bss.percpu.page_aligned x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown xen/arch/arm/xen.lds.S | 5 +++-- xen/arch/x86/setup.c

[Xen-devel] [PATCH v2 1/2] xen/link: Introduce .bss.percpu.page_aligned

2019-07-26 Thread Andrew Cooper
Future changes are going to need to page align some percpu data. This means that the percpu area needs suitably aligning in the BSS so CPU0 has correctly aligned data. Shuffle the exact link order of items within the BSS to give .bss.percpu.page_aligned appropriate alignment. In addition, we

[Xen-devel] [PATCH v2 2/2] x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown

2019-07-26 Thread Andrew Cooper
The XPTI work restricted the visibility of most of memory, but missed a few aspects when it came to the TSS. Given that the TSS is just an object in percpu data, the 4k mapping for it created in setup_cpu_root_pgt() maps adjacent percpu data, making it all leakable via Meltdown, even when XPTI is

[Xen-devel] [xen-unstable-smoke test] 139380: tolerable all pass - PUSHED

2019-07-26 Thread osstest service owner
flight 139380 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/139380/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-armhf-armhf-xl

Re: [Xen-devel] PVHv2/HVM memory layout and interface specification

2019-07-26 Thread Johnson, Ethan
On 2019-07-22 21:11:40 -0400, Andrew Cooper wrote: > On 23/07/2019 00:50, Johnson, Ethan wrote: > > (The Xen 4.7 version of the documentation had a little bit > > more detail at https://xenbits.xen.org/docs/4.7-testing/misc/pvh.html, but > > it still doesn't have quite what I'm looking for, and

[Xen-devel] [linux-linus test] 139361: regressions - FAIL

2019-07-26 Thread osstest service owner
flight 139361 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/139361/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt 7 xen-boot fail REGR. vs. 133580

Re: [Xen-devel] [PATCH v3 33/35] OvmfPkg: Introduce XenIoPvhDxe to initialize Grant Tables

2019-07-26 Thread Laszlo Ersek
On 07/26/19 18:06, Anthony PERARD wrote: > On Wed, Jul 10, 2019 at 04:05:02PM +0200, Laszlo Ersek wrote: >> On 07/04/19 16:42, Anthony PERARD wrote: >>> + if (State == NULL) { >>> +Status = EFI_OUT_OF_RESOURCES; >>> +goto Error; >>> + } >>> + >>> + Allocation = AllocateReservedPages

Re: [Xen-devel] [PATCH 7/7] xen/arm: types: Specify the zero padding in the definition of PRIregister

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > On 23/07/2019 22:35, Julien Grall wrote: >> The definition of PRIregister varies between Arm32 and Arm64 (32-bit vs >> 64-bit). However, some of the users uses the wrong padding. >> >> For more consistency, the padding is now moved into the PRIregister and >> varies

[Xen-devel] [freebsd-master test] 139368: all pass - PUSHED

2019-07-26 Thread osstest service owner
flight 139368 freebsd-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/139368/ Perfect :-) All tests in this flight passed as required version targeted for testing: freebsd 467944ce4546b5d2cd88b15125501d03597920bd baseline version: freebsd

Re: [Xen-devel] [PATCH 2/2] x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown

2019-07-26 Thread Julien Grall
Hi, On 26/07/2019 16:19, Roger Pau Monné wrote: On Fri, Jul 26, 2019 at 03:45:22PM +0100, Andrew Cooper wrote: On 26/07/2019 15:38, Roger Pau Monné wrote: On Fri, Jul 26, 2019 at 02:52:40PM +0100, Andrew Cooper wrote: There is no way to do this inside DEFINE_PER_CPU_PAGE_ALIGNED(), because

[Xen-devel] [PATCH V4] tools/libxl: Add iothread support for COLO

2019-07-26 Thread Zhang Chen
From: Zhang Chen Xen COLO and KVM COLO shared lots of code in Qemu. The colo-compare object in Qemu now requires an 'iothread' property since QEMU 2.11. Detail: https://wiki.qemu.org/Features/COLO Signed-off-by: Zhang Chen Reviewed-by: Anthony PERARD --- tools/libxl/libxl_dm.c | 4 +++- 1

Re: [Xen-devel] [PATCH V3] tools/libxl: Add iothread support for COLO

2019-07-26 Thread Anthony PERARD
On Fri, Jul 26, 2019 at 11:43:40PM +0800, Zhang Chen wrote: > From: Zhang Chen > > Xen COLO and KVM COLO shared lots of code in Qemu. > The colo-compare object in Qemu now requires an 'iothread' property since > QEMU 2.11. > > Detail: > https://wiki.qemu.org/Features/COLO > > Signed-off-by:

Re: [Xen-devel] [PATCH] tboot: remove maintainers and declare orphaned

2019-07-26 Thread Lars Kurth
> On 26 Jul 2019, at 08:17, Roger Pau Monné wrote: > > On Thu, Jul 25, 2019 at 03:08:07PM -0400, Rich Persaud wrote: >> (cc Intel and tboot-devel) >> >> Hi Roger, >> >> Thanks for your interest in documenting the status of maintenance for Intel >> TXT support in Xen. Intel TXT and Xen are

Re: [Xen-devel] [PATCH v3 33/35] OvmfPkg: Introduce XenIoPvhDxe to initialize Grant Tables

2019-07-26 Thread Anthony PERARD
On Wed, Jul 10, 2019 at 04:05:02PM +0200, Laszlo Ersek wrote: > On 07/04/19 16:42, Anthony PERARD wrote: > > + > > +STATIC > > +VOID > > +EFIAPI > > +XenIoPvhDxeNotifyExitBoot ( > > + IN EFI_EVENT Event, > > + IN VOID *Context > > + ) > > +{ > > + XEN_IO_PVH_STATE *State; > > +

Re: [Xen-devel] [RFC] xen: Add .astylerc for automated style-formatting

2019-07-26 Thread Julien Grall
On 26/07/2019 16:48, Viktor Mitin wrote: Hi All, On Thu, Jul 18, 2019 at 5:45 PM Tamas K Lengyel wrote: Checking the comment styles are not included in the automation. The same about clang-format. Checking the comment styles is not supported. It seems this is not code format checker task

Re: [Xen-devel] [RFC] xen: Add .astylerc for automated style-formatting

2019-07-26 Thread Viktor Mitin
Hi All, On Thu, Jul 18, 2019 at 5:45 PM Tamas K Lengyel wrote: > Checking the comment styles are not included in the automation. The same about clang-format. Checking the comment styles is not supported. It seems this is not code format checker task to parse and modify the code comments...

[Xen-devel] [PATCH V3] tools/libxl: Add iothread support for COLO

2019-07-26 Thread Zhang Chen
From: Zhang Chen Xen COLO and KVM COLO shared lots of code in Qemu. The colo-compare object in Qemu now requires an 'iothread' property since QEMU 2.11. Detail: https://wiki.qemu.org/Features/COLO Signed-off-by: Zhang Chen --- tools/libxl/libxl_dm.c | 5 - 1 file changed, 4

Re: [Xen-devel] [RFC] xen: Add .astylerc for automated style-formatting

2019-07-26 Thread Tamas K Lengyel
On Fri, Jul 26, 2019 at 9:12 AM Julien Grall wrote: > > Hi Viktor, > > On 26/07/2019 15:58, Viktor Mitin wrote: > > On Fri, Jul 19, 2019 at 11:37 AM Julien Grall wrote: > >> > >> Hi Tamas, > >> > >> On 18/07/2019 18:22, Tamas K Lengyel wrote: > - Line 139: The { are commonly on the

Re: [Xen-devel] [PATCH 2/2] x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown

2019-07-26 Thread Roger Pau Monné
On Fri, Jul 26, 2019 at 03:45:22PM +0100, Andrew Cooper wrote: > On 26/07/2019 15:38, Roger Pau Monné wrote: > > On Fri, Jul 26, 2019 at 02:52:40PM +0100, Andrew Cooper wrote: > >> The XPTI work restricted the visibility of most of memory, but missed a few > >> aspects when it came to the TSS. >

Re: [Xen-devel] [RFC] xen: Add .astylerc for automated style-formatting

2019-07-26 Thread Julien Grall
Hi Viktor, On 26/07/2019 15:58, Viktor Mitin wrote: On Fri, Jul 19, 2019 at 11:37 AM Julien Grall wrote: Hi Tamas, On 18/07/2019 18:22, Tamas K Lengyel wrote: - Line 139: The { are commonly on the same line as struct or definition. According to CODING_STYLE that's not how it should

Re: [Xen-devel] [PATCH V2] tools/libxl: Add iothread support for COLO

2019-07-26 Thread Zhang, Chen
> -Original Message- > From: Anthony PERARD [mailto:anthony.per...@citrix.com] > Sent: Friday, July 26, 2019 10:34 PM > To: Zhang, Chen > Cc: Ian Jackson ; Wei Liu ; xen- > de...@lists.xenproject.org; Zhang Chen > Subject: Re: [PATCH V2] tools/libxl: Add iothread support for COLO > >

Re: [Xen-devel] [RFC] xen: Add .astylerc for automated style-formatting

2019-07-26 Thread Viktor Mitin
On Fri, Jul 19, 2019 at 11:37 AM Julien Grall wrote: > > Hi Tamas, > > On 18/07/2019 18:22, Tamas K Lengyel wrote: > >> - Line 139: The { are commonly on the same line as struct or > >> definition. > > > > According to CODING_STYLE that's not how it should be. > > I guess you refer to the

Re: [Xen-devel] [RFC] xen: Add .astylerc for automated style-formatting

2019-07-26 Thread Julien Grall
lOn 26/07/2019 15:49, Viktor Mitin wrote: Hi Julien, All, Hi, On Thu, Jul 18, 2019 at 6:44 PM Julien Grall wrote: Hi Tamas, On 7/18/19 4:14 PM, Tamas K Lengyel wrote: On Thu, Jul 18, 2019 at 9:02 AM Julien Grall wrote: Hi Tamas, Adding Lars, Artem and Iurii. Iurii has been working

Re: [Xen-devel] [RFC] xen: Add .astylerc for automated style-formatting

2019-07-26 Thread Viktor Mitin
Please be aware that such for_each_* cases are covered by clang-format. Thanks On Thu, Jul 18, 2019 at 8:50 PM Tamas K Lengyel wrote: > > >- Line 1025: The tools needs to be able to deal for_each_vcpu(...) & co. > > These can be made OK by adding braces. Other than that the only way I >

Re: [Xen-devel] [RFC] xen: Add .astylerc for automated style-formatting

2019-07-26 Thread Viktor Mitin
Hi All, On Thu, Jul 18, 2019 at 8:24 PM Tamas K Lengyel wrote: > > >- Line 139: The { are commonly on the same line as struct or definition. > > According to CODING_STYLE that's not how it should be. All such cases should be explicitly stated in the CODING_STYLE document. Thanks > Tamas >

Re: [Xen-devel] per-domain passthrough/iommu options

2019-07-26 Thread Paul Durrant
> -Original Message- > From: Jan Beulich > Sent: 26 July 2019 15:34 > To: Paul Durrant > Cc: xen-devel (xen-devel@lists.xenproject.org) > > Subject: Re: [Xen-devel] per-domain passthrough/iommu options > > On 26.07.2019 16:26, Paul Durrant wrote: > >> From: Jan Beulich > >> Sent: 26

Re: [Xen-devel] [RFC] xen: Add .astylerc for automated style-formatting

2019-07-26 Thread Tamas K Lengyel
On Fri, Jul 26, 2019 at 8:42 AM Viktor Mitin wrote: > > Hi All, > > On Thu, Jul 18, 2019 at 6:16 PM Jan Beulich wrote: > > > > On 18.07.2019 16:43, Tamas K Lengyel wrote: > > > --- a/CODING_STYLE > > > +++ b/CODING_STYLE > > > @@ -60,8 +60,8 @@ Bracing > > > --- > > > > > > Braces ('{'

Re: [Xen-devel] [PATCH 1/2] xen/link: Introduce .bss.percpu.page_aligned

2019-07-26 Thread Andrew Cooper
On 26/07/2019 15:38, Jan Beulich wrote: > On 26.07.2019 16:30, Andrew Cooper wrote: >> On 26/07/2019 15:22, Roger Pau Monné wrote: >>> On Fri, Jul 26, 2019 at 02:52:39PM +0100, Andrew Cooper wrote: Future changes are going to need to page align some percpu data. This means that the

Re: [Xen-devel] [RFC] xen: Add .astylerc for automated style-formatting

2019-07-26 Thread Viktor Mitin
Hi Julien, All, On Thu, Jul 18, 2019 at 6:44 PM Julien Grall wrote: > > Hi Tamas, > > On 7/18/19 4:14 PM, Tamas K Lengyel wrote: > > On Thu, Jul 18, 2019 at 9:02 AM Julien Grall wrote: > >> > >> Hi Tamas, > >> > >> Adding Lars, Artem and Iurii. Iurii has been working on a version for > >>

Re: [Xen-devel] [PATCH 2/2] x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown

2019-07-26 Thread Andrew Cooper
On 26/07/2019 15:38, Roger Pau Monné wrote: > On Fri, Jul 26, 2019 at 02:52:40PM +0100, Andrew Cooper wrote: >> The XPTI work restricted the visibility of most of memory, but missed a few >> aspects when it came to the TSS. >> >> Given that the TSS is just an object in percpu data, the 4k mapping

Re: [Xen-devel] per-domain passthrough/iommu options

2019-07-26 Thread Jan Beulich
On 26.07.2019 16:26, Paul Durrant wrote: >> From: Jan Beulich >> Sent: 26 July 2019 15:02 >> >> On 26.07.2019 15:39, Paul Durrant wrote: >>> ? I don't think 'private-pt' or 'separate-pt' really capture the fact that >>> the page tables match the >> P2M. They could just as easily be taken to mean

Re: [Xen-devel] [PATCH 7/7] xen/arm: types: Specify the zero padding in the definition of PRIregister

2019-07-26 Thread Julien Grall
On 23/07/2019 22:35, Julien Grall wrote: The definition of PRIregister varies between Arm32 and Arm64 (32-bit vs 64-bit). However, some of the users uses the wrong padding. For more consistency, the padding is now moved into the PRIregister and varies depending on the architecture. Below a

Re: [Xen-devel] [PATCH 1/2] xen/link: Introduce .bss.percpu.page_aligned

2019-07-26 Thread Jan Beulich
On 26.07.2019 16:30, Andrew Cooper wrote: > On 26/07/2019 15:22, Roger Pau Monné wrote: >> On Fri, Jul 26, 2019 at 02:52:39PM +0100, Andrew Cooper wrote: >>> Future changes are going to need to page align some percpu data. >>> >>> This means that the percpu area needs suiably aligning in the BSS

Re: [Xen-devel] [RFC] xen: Add .astylerc for automated style-formatting

2019-07-26 Thread Viktor Mitin
Hi All, On Thu, Jul 18, 2019 at 6:16 PM Jan Beulich wrote: > > On 18.07.2019 16:43, Tamas K Lengyel wrote: > > --- a/CODING_STYLE > > +++ b/CODING_STYLE > > @@ -60,8 +60,8 @@ Bracing > > --- > > > > Braces ('{' and '}') are usually placed on a line of their own, except > > -for the

Re: [Xen-devel] [PATCH 2/2] x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown

2019-07-26 Thread Roger Pau Monné
On Fri, Jul 26, 2019 at 02:52:40PM +0100, Andrew Cooper wrote: > The XPTI work restricted the visibility of most of memory, but missed a few > aspects when it came to the TSS. > > Given that the TSS is just an object in percpu data, the 4k mapping for it > created in setup_cpu_root_pgt() maps

Re: [Xen-devel] [PATCH 7/7] xen/arm: types: Specify the zero padding in the definition of PRIregister

2019-07-26 Thread Julien Grall
On 26/07/2019 15:21, Volodymyr Babchuk wrote: Julien Grall writes: Hi, On 26/07/2019 13:47, Volodymyr Babchuk wrote: Julien Grall writes: The definition of PRIregister varies between Arm32 and Arm64 (32-bit vs 64-bit). However, some of the users uses the wrong padding. type: "users

Re: [Xen-devel] [PATCH V2] tools/libxl: Add iothread support for COLO

2019-07-26 Thread Anthony PERARD
On Fri, Jul 26, 2019 at 02:18:42PM +, Zhang, Chen wrote: > > > -Original Message- > > From: Anthony PERARD [mailto:anthony.per...@citrix.com] > > Sent: Friday, July 26, 2019 9:48 PM > > > > On Fri, Jul 26, 2019 at 02:43:00PM +0800, Zhang Chen wrote: > > What I had in mind while

Re: [Xen-devel] [PATCH 1/2] xen/link: Introduce .bss.percpu.page_aligned

2019-07-26 Thread Andrew Cooper
On 26/07/2019 15:22, Roger Pau Monné wrote: > On Fri, Jul 26, 2019 at 02:52:39PM +0100, Andrew Cooper wrote: >> Future changes are going to need to page align some percpu data. >> >> This means that the percpu area needs suiably aligning in the BSS so CPU0 has >> correctly aligned data. Shuffle

Re: [Xen-devel] [PATCH v2 01/35] xen/arm64: macros: Introduce an assembly macro to alias x30

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > The return address of a function is always stored in x30. For convenience, > introduce a register alias so "lr" can be used in assembly. > > This is defined in asm-arm/arm64/macros.h to allow all assembly files > to use it. > > Signed-off-by: Julien Grall Reviewed-by:

Re: [Xen-devel] per-domain passthrough/iommu options

2019-07-26 Thread Paul Durrant
> -Original Message- > From: Jan Beulich > Sent: 26 July 2019 15:02 > To: Paul Durrant > Cc: xen-devel (xen-devel@lists.xenproject.org) > > Subject: Re: [Xen-devel] per-domain passthrough/iommu options > > On 26.07.2019 15:39, Paul Durrant wrote: > > Not sure how 'on' would co-exist

Re: [Xen-devel] [PATCH 1/2] xen/link: Introduce .bss.percpu.page_aligned

2019-07-26 Thread Roger Pau Monné
On Fri, Jul 26, 2019 at 02:52:39PM +0100, Andrew Cooper wrote: > Future changes are going to need to page align some percpu data. > > This means that the percpu area needs suiably aligning in the BSS so CPU0 has > correctly aligned data. Shuffle the exact link order of items within the BSS > to

Re: [Xen-devel] Xen Coding style and clang-format

2019-07-26 Thread Lars Kurth
> On 26 Jul 2019, at 15:17, Viktor Mitin wrote: > > On Fri, Jul 26, 2019 at 4:52 PM Lars Kurth wrote: thank you for putting this mail together and driving this forward. I added committers@ as well as Doug. I am going to let others respond first. I am assuming we are looking

Re: [Xen-devel] [PATCH 7/7] xen/arm: types: Specify the zero padding in the definition of PRIregister

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > Hi, > > On 26/07/2019 13:47, Volodymyr Babchuk wrote: >> >> Julien Grall writes: >> >>> The definition of PRIregister varies between Arm32 and Arm64 (32-bit vs >>> 64-bit). However, some of the users uses the wrong padding. >> type: "users use" >> >>> For more consistency,

Re: [Xen-devel] [PATCH V2] tools/libxl: Add iothread support for COLO

2019-07-26 Thread Zhang, Chen
> -Original Message- > From: Anthony PERARD [mailto:anthony.per...@citrix.com] > Sent: Friday, July 26, 2019 9:48 PM > To: Zhang, Chen > Cc: Ian Jackson ; Wei Liu ; xen- > de...@lists.xenproject.org; Zhang Chen > Subject: Re: [PATCH V2] tools/libxl: Add iothread support for COLO > > On

Re: [Xen-devel] Xen Coding style and clang-format

2019-07-26 Thread Viktor Mitin
On Fri, Jul 26, 2019 at 4:52 PM Lars Kurth wrote: > >> thank you for putting this mail together and driving this forward. I added > >> committers@ as well as Doug. I am going to let others respond first. > >> I am assuming we are looking for some testing? > > > > Yes, you are right. > > The

Re: [Xen-devel] [PATCH 3/7] xen/arm: Rework psr_mode_is_32bit()

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > Hi, > > On 26/07/2019 13:31, Volodymyr Babchuk wrote: >> >> Julien Grall writes: >> >>> psr_mode_is_32bit() prototype does not match the rest of the helpers for >>> the process state. Looking at the callers, most of them will access >>> struct cpu_user_regs just for

Re: [Xen-devel] per-domain passthrough/iommu options

2019-07-26 Thread Jan Beulich
On 26.07.2019 15:39, Paul Durrant wrote: > Not sure how 'on' would co-exist with 'viommu'... the crucial difference is > whether the p2m is shared or not and the currently the only option in the > non-shared case, because we lack a viommu, is to keep the IOMMU mappings in > sync with the P2M

Re: [Xen-devel] [PATCH] arm:cpuerrata: Align a virtual address before unmap

2019-07-26 Thread Julien Grall
Hi, It looks like the vmap solution suggested by Andrew & I is a dead end. I still think we need to do something in the vmap regardless the alignment decision to avoid unwanted surprised (i.e the Page-table not in sync with the vmap state). We potentially want to add some

Re: [Xen-devel] [PATCH v6 5/5] x86/mem_sharing: style cleanup

2019-07-26 Thread Viktor Mitin
Hi Jan, All, On Thu, Jul 18, 2019 at 4:38 PM Jan Beulich wrote: > >> But you're actively breaking Xen style here (and below). > > > > I don't see any mention of style restrictions regarding this in > > CODING_STYLE. If there is, I would prefer changing that so we can > > automate style checks

Re: [Xen-devel] Xen Coding style and clang-format

2019-07-26 Thread Lars Kurth
> On 26 Jul 2019, at 14:45, Viktor Mitin wrote: > >> Hi Viktor, > > Hi Lars, > >> thank you for putting this mail together and driving this forward. I added >> committers@ as well as Doug. I am going to let others respond first. >> I am assuming we are looking for some testing? > > Yes,

[Xen-devel] [PATCH 1/2] xen/link: Introduce .bss.percpu.page_aligned

2019-07-26 Thread Andrew Cooper
Future changes are going to need to page align some percpu data. This means that the percpu area needs suiably aligning in the BSS so CPU0 has correctly aligned data. Shuffle the exact link order of items within the BSS to give .bss.percpu.page_aligned appropriate alignment. Additionally,

[Xen-devel] [PATCH 2/2] x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown

2019-07-26 Thread Andrew Cooper
The XPTI work restricted the visibility of most of memory, but missed a few aspects when it came to the TSS. Given that the TSS is just an object in percpu data, the 4k mapping for it created in setup_cpu_root_pgt() maps adjacent percpu data, making it all leakable via Meltdown, even when XPTI is

[Xen-devel] [PATCH 0/2] x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown

2019-07-26 Thread Andrew Cooper
Andrew Cooper (2): xen/link: Introduce .bss.percpu.page_aligned x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown xen/arch/arm/xen.lds.S | 5 +++-- xen/arch/x86/setup.c| 2 -- xen/arch/x86/traps.c| 6 ++ xen/arch/x86/xen.lds.S | 7

Re: [Xen-devel] Xen Coding style and clang-format

2019-07-26 Thread Viktor Mitin
Hi Julien, > I have already done some testings a couple of weeks ago with the patch [1]. I > have sent some comments regarding the change made by the tools that require > some > attention. It would be good if someone go through them and try to address one > by > one. For convenience I have

Re: [Xen-devel] [PATCH V2] tools/libxl: Add iothread support for COLO

2019-07-26 Thread Anthony PERARD
On Fri, Jul 26, 2019 at 02:43:00PM +0800, Zhang Chen wrote: > From: Zhang Chen > > Xen COLO and KVM COLO shared lots of code in Qemu. > KVM COLO has added the iothread support, so we add it on Xen. It would be useful to expand the comment of the commit and explain why the change is required. I

Re: [Xen-devel] [PATCH] x86: don't include {amd-, }iommu.h from fixmap.h

2019-07-26 Thread Andrew Cooper
On 26/07/2019 14:34, Jan Beulich wrote: > The #include was added by 0700c962ac ("Add AMD IOMMU support into > hypervisor") and I then didn't drop it again in d7f913b8de ("AMD IOMMU: > use ioremap()"); similarly for xen/iommu.h in 99321e0e6c ("VT-d: use > ioremap()"). Avoid needlessly re-building

Re: [Xen-devel] Xen Coding style and clang-format

2019-07-26 Thread Viktor Mitin
> Hi Viktor, Hi Lars, > thank you for putting this mail together and driving this forward. I added > committers@ as well as Doug. I am going to let others respond first. > I am assuming we are looking for some testing? Yes, you are right. The implementation has been updated and retested with

[Xen-devel] [PATCH] x86: don't include {amd-, }iommu.h from fixmap.h

2019-07-26 Thread Jan Beulich
The #include was added by 0700c962ac ("Add AMD IOMMU support into hypervisor") and I then didn't drop it again in d7f913b8de ("AMD IOMMU: use ioremap()"); similarly for xen/iommu.h in 99321e0e6c ("VT-d: use ioremap()"). Avoid needlessly re-building unrelated files when only IOMMU definitions have

Re: [Xen-devel] per-domain passthrough/iommu options

2019-07-26 Thread Paul Durrant
> -Original Message- > From: Jan Beulich > Sent: 26 July 2019 13:57 > To: Paul Durrant > Cc: xen-devel (xen-devel@lists.xenproject.org) > > Subject: Re: [Xen-devel] per-domain passthrough/iommu options > > On 26.07.2019 14:29, Paul Durrant wrote: > >I sent a previous email [1]

[Xen-devel] [PATCH 0/3] build: honor toolchain related environment vars

2019-07-26 Thread Roger Pau Monne
Hello, Current Xen build system will ignore any toolchain related variables on the environment when building (ie: CC, LD, CXX...), and the only way to set those is to assign them directly on the make command line (ie: make CC=foo CXX=bar ...). The following series attempts to fix this, by

[Xen-devel] [PATCH 1/3] kconfig: include default toolchain values

2019-07-26 Thread Roger Pau Monne
Include config/$(OS).mk which contains the default values for the toolchain variables. This removes the need to pass HOST{CC/CXX} as parameters from the high level make target or to default them to gcc/g++ if unset. Signed-off-by: Roger Pau Monné --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian

[Xen-devel] [PATCH 2/3] build: allow picking the env values for compiler variables

2019-07-26 Thread Roger Pau Monne
Don't force the usage of the hardcoded compiler values if those are already set on the environment. This allows the Xen build system to correctly pick CC/CXX values present on the environment, and fixes the usage of those by the Gitlab CI test system. Note that without this fix the Xen build

[Xen-devel] [PATCH 3/3] build: allow picking the env values for toolchain utilities

2019-07-26 Thread Roger Pau Monne
Don't force the usage of the hardcoded toolchain values if those are already set on the environment. Note that as part of the change the definition of AS and LD is moved after the setting of compiler related variables. Signed-off-by: Roger Pau Monné --- Cc: Andrew Cooper Cc: George Dunlap Cc:

Re: [Xen-devel] [PATCH] xen/arm: extend fdt_property_interrupts

2019-07-26 Thread Volodymyr Babchuk
Viktor Mitin writes: > Hi Volodymyr, > > On Fri, Jul 26, 2019 at 2:57 PM Volodymyr Babchuk > wrote: >> >> >> Hello Vikor, >> >> Viktor Mitin writes: >> >> > xen/arm: extend fdt_property_interrupts to deal with other >> > domain than the hwdom >> >> It is unclear what problem you are facing.

Re: [Xen-devel] [PATCH 7/7] xen/arm: types: Specify the zero padding in the definition of PRIregister

2019-07-26 Thread Julien Grall
Hi, On 26/07/2019 13:47, Volodymyr Babchuk wrote: Julien Grall writes: The definition of PRIregister varies between Arm32 and Arm64 (32-bit vs 64-bit). However, some of the users uses the wrong padding. type: "users use" For more consistency, the padding is now moved into the PRIregister

Re: [Xen-devel] [PATCH 1/7] xen/public: arch-arm: Restrict the visibility of struct vcpu_guest_core_regs

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > On 26/07/2019 13:14, Volodymyr Babchuk wrote: >> >> Hi Julien, > > Hi Volodymyr, > >> Julien Grall writes: >> >>> Currently, the structure vcpu_guest_core_regs is part of the public API. >>> This implies that any change in the structure should be backward >>> compatible.

Re: [Xen-devel] [PATCH RFC] x86/shim: Refresh pvshim_defconfig

2019-07-26 Thread Andrew Cooper
On 26/07/2019 14:10, Tamas K Lengyel wrote: > On Fri, Jul 26, 2019 at 6:58 AM Andrew Cooper > wrote: >> On 26/07/2019 13:55, Tamas K Lengyel wrote: >>> On Fri, Jul 26, 2019 at 4:11 AM Andrew Cooper >>> wrote: * Add a dependency so the shim gets rebuilt when pvshim_defconfig changes.

Re: [Xen-devel] [PATCH RFC] x86/shim: Refresh pvshim_defconfig

2019-07-26 Thread Tamas K Lengyel
On Fri, Jul 26, 2019 at 6:58 AM Andrew Cooper wrote: > > On 26/07/2019 13:55, Tamas K Lengyel wrote: > > On Fri, Jul 26, 2019 at 4:11 AM Andrew Cooper > > wrote: > >> * Add a dependency so the shim gets rebuilt when pvshim_defconfig changes. > >> * Default to the NULL scheduler now that it

Re: [Xen-devel] [PATCH 3/7] xen/arm: Rework psr_mode_is_32bit()

2019-07-26 Thread Julien Grall
Hi, On 26/07/2019 13:31, Volodymyr Babchuk wrote: Julien Grall writes: psr_mode_is_32bit() prototype does not match the rest of the helpers for the process state. Looking at the callers, most of them will access struct cpu_user_regs just for calling psr_mode_is_32bit(). The macro is now

[Xen-devel] [libvirt test] 139358: regressions - FAIL

2019-07-26 Thread osstest service owner
flight 139358 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/139358/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt-pair 11 xen-boot/dst_host fail REGR. vs. 139303

Re: [Xen-devel] [RFC 3/6] sysctl: extend XEN_SYSCTL_getcpuinfo interface

2019-07-26 Thread Andrii Anisov
On 26.07.19 15:15, Dario Faggioli wrote: Yep, I think being able to know time spent running guests could be useful. Well, my intention was to see hypervisor run and true idle time. With this full series I see the distinct difference in xentop depending on the type of load in domains: On

Re: [Xen-devel] per-domain passthrough/iommu options

2019-07-26 Thread Jan Beulich
On 26.07.2019 14:29, Paul Durrant wrote: >I sent a previous email [1] about enabling use of the IOMMU on a > per-domain basis and am now a reasonable way into my patch series, which also > allows for IOMMU option-setting (specifically shared EPT use) on a per-domain > basis too. Before I

Re: [Xen-devel] [PATCH RFC] x86/shim: Refresh pvshim_defconfig

2019-07-26 Thread Andrew Cooper
On 26/07/2019 13:55, Tamas K Lengyel wrote: > On Fri, Jul 26, 2019 at 4:11 AM Andrew Cooper > wrote: >> * Add a dependency so the shim gets rebuilt when pvshim_defconfig changes. >> * Default to the NULL scheduler now that it works with vcpu online/offline. >> >> Signed-off-by: Andrew Cooper >>

Re: [Xen-devel] [PATCH RFC] x86/shim: Refresh pvshim_defconfig

2019-07-26 Thread Tamas K Lengyel
On Fri, Jul 26, 2019 at 4:11 AM Andrew Cooper wrote: > > * Add a dependency so the shim gets rebuilt when pvshim_defconfig changes. > * Default to the NULL scheduler now that it works with vcpu online/offline. > > Signed-off-by: Andrew Cooper > --- > CC: Jan Beulich > CC: Wei Liu > CC: Roger

Re: [Xen-devel] [PATCH 1/7] xen/public: arch-arm: Restrict the visibility of struct vcpu_guest_core_regs

2019-07-26 Thread Julien Grall
On 26/07/2019 13:14, Volodymyr Babchuk wrote: Hi Julien, Hi Volodymyr, Julien Grall writes: Currently, the structure vcpu_guest_core_regs is part of the public API. This implies that any change in the structure should be backward compatible. However, the structure is only needed by the

Re: [Xen-devel] Xen Coding style and clang-format

2019-07-26 Thread Julien Grall
On 26/07/2019 13:42, Lars Kurth wrote: Hi Viktor, Hi, thank you for putting this mail together and driving this forward. I added committers@ as well as Doug. I am going to let others respond first. I am assuming we are looking for some testing? I have already done some testings a couple

Re: [Xen-devel] [PATCH 7/7] xen/arm: types: Specify the zero padding in the definition of PRIregister

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > The definition of PRIregister varies between Arm32 and Arm64 (32-bit vs > 64-bit). However, some of the users uses the wrong padding. type: "users use" > For more consistency, the padding is now moved into the PRIregister and > varies depending on the architecture. I'm

Re: [Xen-devel] [PATCH] xen/arm: extend fdt_property_interrupts

2019-07-26 Thread Viktor Mitin
Hi Volodymyr, On Fri, Jul 26, 2019 at 2:57 PM Volodymyr Babchuk wrote: > > > Hello Vikor, > > Viktor Mitin writes: > > > xen/arm: extend fdt_property_interrupts to deal with other > > domain than the hwdom > > It is unclear what problem you are facing. Could you please elaborate > commit

Re: [Xen-devel] [PATCH 6/7] xen/arm: vsmc: The function identifier is always 32-bit

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > On Arm64, the SMCCC function identifier is always stored in the first 32-bit > of x0 register. The rest of the bits are not defined and should be > ignored. > > This means the variable funcid should be an uint32_t rather than > register_t. > > Signed-off-by: Julien Grall

Re: [Xen-devel] [PATCH 5/7] xen/arm: traps: Avoid BUG_ON() in do_trap_brk()

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > At the moment, do_trap_brk() is using a BUG_ON() to check the hardware > has been correctly configured during boot. > > Any error when configuring the hardware could result to a guest 'brk' > trapping in the hypervisor and crash it. > > This is pretty harsh to kill Xen

[Xen-devel] per-domain passthrough/iommu options

2019-07-26 Thread Paul Durrant
Hi, I sent a previous email [1] about enabling use of the IOMMU on a per-domain basis and am now a reasonable way into my patch series, which also allows for IOMMU option-setting (specifically shared EPT use) on a per-domain basis too. Before I post v1 I'd like to get some opinion on the

Re: [Xen-devel] [RFC 2/6] schedule: account true system idle time

2019-07-26 Thread Andrii Anisov
Hello Dario, On 26.07.19 15:00, Dario Faggioli wrote: On Fri, 2019-07-26 at 13:37 +0300, Andrii Anisov wrote: From: Andrii Anisov Currently the idle time is being accounted as a idle vcpu runtime. This is not entirely correct, because the entity named idle vcpu is in fact a hypervisor tasks

Re: [Xen-devel] [PATCH 3/7] xen/arm: Rework psr_mode_is_32bit()

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > psr_mode_is_32bit() prototype does not match the rest of the helpers for > the process state. Looking at the callers, most of them will access > struct cpu_user_regs just for calling psr_mode_is_32bit(). > > The macro is now reworked to take a struct cpu_user_regs in

Re: [Xen-devel] Xen Coding style and clang-format

2019-07-26 Thread Lars Kurth
> On 26 Jul 2019, at 13:30, Viktor Mitin wrote: > > Hi All, > > The Xen Project has a coding standard in place, but like many > projects, the standard is only enforced through peer review. Such > mistakes slip through and code is imported from other projects which > may not follow the same

[Xen-devel] [qemu-mainline test] 139352: regressions - FAIL

2019-07-26 Thread osstest service owner
flight 139352 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/139352/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 12 guest-start/debianhvm.repeat fail REGR.

Re: [Xen-devel] [PATCH 4/7] xen/arm: traps: Avoid using BUG_ON() in _show_registers()

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > At the moment, _show_registers() is using a BUG_ON() to assert only > userspace will run 32-bit code in a 64-bit domain. > > Such extra precaution is not necessary and could be avoided by only > checking the CPU mode to decide whether show_registers_64() or >

  1   2   >