Re: [PATCH] x86: arrange for ENDBR zapping from _ctxt_switch_masking()

2024-02-01 Thread Jan Beulich
On 01.02.2024 22:12, Andrew Cooper wrote: > On 16/01/2024 4:53 pm, Jan Beulich wrote: >> While altcall is already used for them, the functions want announcing in >> .init.rodata.cf_clobber, even if the resulting static variables aren't >> otherwise used. >> >> While doing this also move

Ping: [PATCH] x86/guest: finish conversion to altcall

2024-02-01 Thread Jan Beulich
On 17.01.2024 10:31, Jan Beulich wrote: > While .setup() and .e820_fixup() don't need fiddling with for being run > only very early, both .ap_setup() and .resume() want converting too: > This way both pre-filled struct hypervisor_ops instances can become > __initconst_cf_clobber, thus allowing to

Re: [PATCH] xen: Swap order of actions in the FREE*() macros

2024-02-01 Thread Jan Beulich
On 02.02.2024 01:39, Andrew Cooper wrote: > Wherever possible, it is a good idea to NULL out the visible reference to an > object prior to freeing it. The FREE*() macros already collect together both > parts, making it easy to adjust. > > This has a marginal code generation improvement, as some

[linux-6.1 baseline test] 184549: tolerable FAIL

2024-02-01 Thread osstest service owner
"Old" tested version had not actually been tested; therefore in this flight we test it, rather than a new candidate. The baseline, if any, is the most recent actually tested revision. flight 184549 linux-6.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/184549/ Failures :-/ but

[ovmf test] 184561: all pass - PUSHED

2024-02-01 Thread osstest service owner
flight 184561 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/184561/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 927ea1364d047d54cb67e0f231644f295c032944 baseline version: ovmf

Re: [PATCH v12 11/15] vpci: add initial support for virtual PCI bus topology

2024-02-01 Thread Stewart Hildebrand
On 1/25/24 11:00, Jan Beulich wrote: > On 09.01.2024 22:51, Stewart Hildebrand wrote: >> --- a/xen/drivers/Kconfig >> +++ b/xen/drivers/Kconfig >> @@ -15,4 +15,8 @@ source "drivers/video/Kconfig" >> config HAS_VPCI >> bool >> >> +config HAS_VPCI_GUEST_SUPPORT >> +bool >> +depends

[ovmf test] 184558: all pass - PUSHED

2024-02-01 Thread osstest service owner
flight 184558 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/184558/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 3656352675bf66c06b65bf85632996d3471073ae baseline version: ovmf

[xen-unstable-smoke test] 184560: tolerable all pass - PUSHED

2024-02-01 Thread osstest service owner
flight 184560 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/184560/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

[PATCH] xen: Swap order of actions in the FREE*() macros

2024-02-01 Thread Andrew Cooper
Wherever possible, it is a good idea to NULL out the visible reference to an object prior to freeing it. The FREE*() macros already collect together both parts, making it easy to adjust. This has a marginal code generation improvement, as some of the calls to the free() function can be tailcall

[xen-unstable-smoke test] 184555: tolerable all pass - PUSHED

2024-02-01 Thread osstest service owner
flight 184555 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/184555/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

[xtf test] 184556: all pass - PUSHED

2024-02-01 Thread osstest service owner
flight 184556 xtf real [real] http://logs.test-lab.xenproject.org/osstest/logs/184556/ Perfect :-) All tests in this flight passed as required version targeted for testing: xtf d1de27cf787e9c86610b11f6fe13d90f5ca91e27 baseline version: xtf

[xen-unstable test] 184547: tolerable FAIL

2024-02-01 Thread osstest service owner
flight 184547 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/184547/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 184535

[PATCH v2 2/3] libxl: Allow Phy backend for CDROM devices

2024-02-01 Thread Jason Andryuk
A Linux HVM domain ignores PV block devices with type cdrom. The Windows PV drivers also ignore device-type != "disk". Therefore QEMU's emulated CD-ROM support is used. This allows ejection and other CD-ROM features to work. With a stubdom, QEMU is running in the stubdom. A PV disk is still

[PATCH v2 0/3] libxl: Stubdom cd-rom changing support

2024-02-01 Thread Jason Andryuk
These patches enable cd-rom media changing for an HVM with a linux stubdom. v1 didn't support these empty drives. The code came out of OpenXT which has a hack - null.iso. null.iso is an ISO with no contents. OpenXT doesn't actually eject the cd-rom, it just inserts null.iso. This patch set

[PATCH v2 3/3] libxl: Enable stubdom cdrom changing

2024-02-01 Thread Jason Andryuk
To change the cd-rom medium, libxl will: - QMP eject the medium from QEMU - block-detach the old PV disk - block-attach the new PV disk - QMP change the medium to the new PV disk by fdset-id The QMP code is reused, and remove and attach are implemented here. The stubdom must internally

[PATCH v2 1/3] libxl: Create empty file for Phy cdrom

2024-02-01 Thread Jason Andryuk
With a device model stubdom, dom0 exports a PV disk to the stubdom. Inside the stubdom, QEMU emulates a cdrom to the guest with a host_device pointing at the PV frontend (/dev/xvdc) An empty cdrom drive causes problems booting the stubdom. The PV disk protocol isn't designed to support no media.

Re: [PATCH] x86: arrange for ENDBR zapping from _ctxt_switch_masking()

2024-02-01 Thread Andrew Cooper
On 16/01/2024 4:53 pm, Jan Beulich wrote: > While altcall is already used for them, the functions want announcing in > .init.rodata.cf_clobber, even if the resulting static variables aren't > otherwise used. > > While doing this also move ctxt_switch_masking to .data.ro_after_init. > >

Re: [PATCH] xen/bitmap: Drop unused headers

2024-02-01 Thread Andrew Cooper
On 01/02/2024 10:35 am, Andrew Cooper wrote: > Nothing in bitmap.h uses lib.h, and there's no point including types.h when we > need to include bitops.h anyway. > > Signed-off-by: Andrew Cooper > --- > CC: George Dunlap > CC: Jan Beulich > CC: Stefano Stabellini > CC: Wei Liu > CC: Julien

Re: [PATCH] Fix some typos in comments

2024-02-01 Thread Andrew Cooper
On 01/02/2024 3:07 pm, Andrew Cooper wrote: > On 01/02/2024 2:59 pm, Frediano Ziglio wrote: >> Signed-off-by: Frediano Ziglio >> --- >> arch/x86/include/arch/processor.h | 2 +- >> include/xen/hvm/params.h | 2 +- >> include/xtf/console.h | 2 +- >> include/xtf/extable.h

Re: [PATCH 5/4] libxl: blktap/tapback support

2024-02-01 Thread Andrew Cooper
On 01/02/2024 6:30 pm, Jason Andryuk wrote: > Jason Andryuk (4): > block-common: Fix same_vm for no targets > libxl: Add support for blktap vbd3 > hotplug: Update block-tap > libxl: Support blktap with HVM device model If libxl is learning how to drive tapdisk, then it's time for:

Re: Nullifying Recently Introduced Xen Headers Check

2024-02-01 Thread John L. Poole
On Thursday, February 1st, 2024 at 9:18 AM, David Woodhouse wrote: > (Thanks Andy for the explicit cc) > > On Thu, 2024-02-01 at 00:05 +, John L. Poole wrote: > > > cause Gentoo's build to error out. See line 24790: > > > > 5 | #error In Xen native files, include xen_native.h before

[PATCH 3/4] hotplug: Update block-tap

2024-02-01 Thread Jason Andryuk
Implement a sharing check like the regular block script. Checking tapback inside block-tap is too late since it needs to be running to transition the backend to InitWait before block-tap is run. tap-ctl check will be removed when the requirement for the blktap kernel driver is removed. Remove

[PATCH 1/4] block-common: Fix same_vm for no targets

2024-02-01 Thread Jason Andryuk
same_vm is broken when the two main domains do not have targets. otvm and targetvm are both missing, which means they get set to -1 and then converted to empty strings: ++10697+ local targetvm=-1 ++10697+ local otvm=-1 ++10697+ otvm= ++10697+ othervm=/vm/cc97bc2f-3a91-43f7-8fbc-4cb92f90b4e4

[PATCH 4/4] libxl: Support blktap with HVM device model

2024-02-01 Thread Jason Andryuk
blktap exposes disks over UNIX socket Network Block Device (NBD). Modify libxl__device_disk_find_local_path() to provide back the QEMU-formatted NBD path. This allows tapdisk to be used for booting an HVM. Use the nbd+unix:/// format specified by the protocol at

[PATCH 2/4] libxl: Add support for blktap vbd3

2024-02-01 Thread Jason Andryuk
This patch re-introduces blktap support to libxl. Unlike earlier versions, it does not link against any blktap library. libxl changes are needed to write to the vbd3 backend XenStore nodes. blktap has three components. tapdisk is a daemon implementing the disk IO, NBD (Network Block Device),

[PATCH 0/4] libxl: blktap/tapback support

2024-02-01 Thread Jason Andryuk
This patch re-introduces blktap support to libxl. Unlike earlier versions, it does not link against any blktap library. libxl changes are needed to write to the vbd3 backend XenStore nodes. blktap has three components. tapdisk is a daemon implementing the disk IO, NBD (Network Block Device),

[xen-unstable-smoke test] 184552: tolerable all pass - PUSHED

2024-02-01 Thread osstest service owner
flight 184552 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/184552/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

Re: [PATCH] xen/arm: Properly clean update to init_ttbr and smp_up_cpu

2024-02-01 Thread Julien Grall
Hi, On 31/01/2024 07:57, Bertrand Marquis wrote: On 30 Jan 2024, at 18:29, Julien Grall wrote: From: Julien Grall Recent rework to the secondary boot code modified how init_ttbr and smp_up_cpu are accessed. Rather than directly accessing them, we are using a pointer to them. The helper

Re: Nullifying Recently Introduced Xen Headers Check

2024-02-01 Thread David Woodhouse
(Thanks Andy for the explicit cc) On Thu, 2024-02-01 at 00:05 +, John L. Poole wrote: > > cause Gentoo's build to error out.  See line 24790: > >     5 | #error In Xen native files, include xen_native.h before other Xen > headers > > at >

Re: [PATCH v4 3/8] VMX: tertiary execution control infrastructure

2024-02-01 Thread Roger Pau Monné
On Thu, Feb 01, 2024 at 01:09:11PM +0100, Jan Beulich wrote: > On 01.02.2024 12:50, Roger Pau Monné wrote: > > On Thu, Jan 11, 2024 at 10:00:10AM +0100, Jan Beulich wrote: > >> @@ -503,6 +538,9 @@ static int vmx_init_vmcs_config(bool bsp > >> "Secondary Exec Control", > >>

[PATCH 4/4] iommu/x86: make unity range checking more strict

2024-02-01 Thread Roger Pau Monne
Currently when a unity range overlaps with memory being used as RAM by the hypervisor the result would be that the IOMMU gets disabled. However that's not enough, as even with the IOMMU disabled the device will still access the affected RAM areas. Note that IVMD or RMRR ranges being placed over

[PATCH 2/4] iommu/x86: introduce a generic IVMD/RMRR range validity helper

2024-02-01 Thread Roger Pau Monne
IVMD and RMRR ranges are functionally equivalent, and as so could use the same validity checker. Move the IVMD to x86 common IOMMU code and adjust the function to take a pair of [start, end) mfn parameters. So far only the AMD-Vi side is adjusted to use the newly introduced helper, the VT-d side

[PATCH 3/4] iommu/vt-d: switch to common RMRR checker

2024-02-01 Thread Roger Pau Monne
Use the newly introduced generic unity map checker. Also drop the message recommending the usage of iommu_inclusive_mapping: the ranges would end up being mapped anyway even if some of the checks above failed, regardless of whether iommu_inclusive_mapping is set. Signed-off-by: Roger Pau Monné

[PATCH 0/4] iommu/x86: fixes/improvements for unity range checks

2024-02-01 Thread Roger Pau Monne
Hello, Patch 1 is a bugfix for AMD-Vi IVMD range type checks. Further patches unify the IVMD/RMRR checks into a common function, and the last patch tightens up the condition to panic when attempting to boot on a system that has RMRR or IVMD regions over memory that Xen uses as RAM. Thanks,

[PATCH 1/4] amd-vi: fix IVMD memory type checks

2024-02-01 Thread Roger Pau Monne
The current code that parses the IVMD blocks is relaxed with regard to the restriction that such unity regions should always fall into memory ranges marked as reserved in the memory map. However the type checks for the IVMD addresses are inverted, and as a result IVMD ranges falling into RAM

Re: Next steps for Rust guest agent

2024-02-01 Thread George Dunlap
On Thu, Feb 1, 2024 at 4:57 PM Julien Grall wrote: > > Hi George, > > On 01/02/2024 16:55, George Dunlap wrote: > > On Thu, Jan 11, 2024 at 12:27 PM Yann Dirson wrote: > >>> - what should be the criteria to advertise it as official Xenproject > >>> guest agent ? > >> > >> What do people think

Re: Next steps for Rust guest agent

2024-02-01 Thread Julien Grall
Hi George, On 01/02/2024 16:55, George Dunlap wrote: On Thu, Jan 11, 2024 at 12:27 PM Yann Dirson wrote: - what should be the criteria to advertise it as official Xenproject guest agent ? What do people think here? As we discussed at the community call, I think that we should basically

Re: Next steps for Rust guest agent

2024-02-01 Thread George Dunlap
On Thu, Jan 11, 2024 at 12:27 PM Yann Dirson wrote: > > - what should be the criteria to advertise it as official Xenproject > > guest agent ? > > What do people think here? As we discussed at the community call, I think that we should basically set a date at which we consider this the official

Re: [BUG]i2c_hid_acpi broken with 4.17.2 on Framework Laptop 13 AMD

2024-02-01 Thread Sébastien Chaumat
Le jeu. 1 févr. 2024 à 13:30, Sébastien Chaumat a écrit : > I spotted the following warning for IRQ7 (along with IRQ6 and 10) > > [0.686073] fedora kernel: __irq_set_trigger: genirq: No set_type > function for IRQ 7 (IR-IO-APIC) > > This comes from kernel/irq/manage.c > > > int

Re: [PATCH net] xen-netback: properly sync TX responses

2024-02-01 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to netdev/net.git (main) by Jakub Kicinski : On Mon, 29 Jan 2024 14:03:08 +0100 you wrote: > Invoking the make_tx_response() / push_tx_responses() pair with no lock > held would be acceptable only if all such invocations happened from the > same context (NAPI

[linux-linus test] 184545: tolerable FAIL - PUSHED

2024-02-01 Thread osstest service owner
flight 184545 linux-linus real [real] flight 184550 linux-linus real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/184545/ http://logs.test-lab.xenproject.org/osstest/logs/184550/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking):

Re: [PATCH v4 22/47] hw/arm/aspeed: use qemu_configure_nic_device()

2024-02-01 Thread Cédric Le Goater
On 1/26/24 18:24, David Woodhouse wrote: From: David Woodhouse Signed-off-by: David Woodhouse Acked-by: Cédric Le Goater and Reviewed-by: Cédric Le Goater Thanks, C. --- hw/arm/aspeed.c | 9 - 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/hw/arm/aspeed.c

Re: [PATCH 1/2] xen/arm: Add imx8q{m,x} platform glue

2024-02-01 Thread John Ernberg
On 2/1/24 13:20, Julien Grall wrote: > > > On 31/01/2024 15:32, John Ernberg wrote: >> Hi Julien, > > Hi John, > >> On 1/31/24 13:22, Julien Grall wrote: >>> Hi, >>> >>> On 31/01/2024 11:50, John Ernberg wrote: When using Linux for dom0 there are a bunch of drivers that need to do

Re: [PATCH 1/2] xen/arm: Add imx8q{m,x} platform glue

2024-02-01 Thread John Ernberg
Hi Peng, On 2/1/24 05:10, Peng Fan wrote: >> Cc: Jonas Blixt ; xen-devel@lists.xenproject.org >> Subject: Re: [PATCH 1/2] xen/arm: Add imx8q{m,x} platform glue >> >> Hi Julien, >> >> On 1/31/24 13:22, Julien Grall wrote: >>> Hi, >>> >>> On 31/01/2024 11:50, John Ernberg wrote: When using

Re: [PATCH net] xen-netback: properly sync TX responses

2024-02-01 Thread Paul Durrant
On 29/01/2024 13:03, Jan Beulich wrote: Invoking the make_tx_response() / push_tx_responses() pair with no lock held would be acceptable only if all such invocations happened from the same context (NAPI instance or dealloc thread). Since this isn't the case, and since the interface "spec" also

Re: [PATCH v6 10/15] xen: add cache coloring allocator for domains

2024-02-01 Thread Jan Beulich
On 29.01.2024 18:18, Carlo Nonato wrote: > @@ -157,7 +158,11 @@ > #define PGC_static 0 > #endif > > -#define PGC_preserved (PGC_extra | PGC_static) > +#ifndef PGC_colored > +#define PGC_colored 0 > +#endif > + > +#define PGC_preserved (PGC_extra | PGC_static | PGC_colored) > > #ifndef

[libvirt test] 184548: regressions - FAIL

2024-02-01 Thread osstest service owner
flight 184548 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/184548/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-libvirt 6 libvirt-buildfail REGR. vs. 184537 Tests which did not

Re: [PATCH net] xen-netback: properly sync TX responses

2024-02-01 Thread Paul Durrant
On 01/02/2024 00:23, Jakub Kicinski wrote: On Mon, 29 Jan 2024 14:03:08 +0100 Jan Beulich wrote: Invoking the make_tx_response() / push_tx_responses() pair with no lock held would be acceptable only if all such invocations happened from the same context (NAPI instance or dealloc thread). Since

Re: [PATCH v6 09/15] xen/page_alloc: introduce preserved page flags macro

2024-02-01 Thread Jan Beulich
On 01.02.2024 15:49, Carlo Nonato wrote: > On Thu, Feb 1, 2024 at 3:24 PM Jan Beulich wrote: >> On 29.01.2024 18:18, Carlo Nonato wrote: >>> PGC_static and PGC_extra are flags that needs to be preserved when assigning >>> a page. Define a new macro that groups those flags and use it instead of

Re: [PATCH v6 12/15] xen/arm: add Xen cache colors command line parameter

2024-02-01 Thread Jan Beulich
On 29.01.2024 18:18, Carlo Nonato wrote: > --- a/xen/common/llc-coloring.c > +++ b/xen/common/llc-coloring.c > @@ -9,6 +9,9 @@ > #include > #include > > +#define XEN_DEFAULT_COLOR 0 > +#define XEN_DEFAULT_NUM_COLORS 1 > + > bool __ro_after_init llc_coloring_enabled; >

Re: Issue iommu unrecognized on amd computer

2024-02-01 Thread oxjo
I put it on the linux command line indeed, here is the log with iommu=debug. I can install Xen with a debug build or test a fix if needed. I just need some guides because all I did for know is apt or dnf install Xen. Le jeudi 1 février 2024 à 11:57, Jan Beulich a écrit : > On 01.02.2024

Re: [PATCH] Fix some typos in comments

2024-02-01 Thread Andrew Cooper
On 01/02/2024 2:59 pm, Frediano Ziglio wrote: > Signed-off-by: Frediano Ziglio > --- > arch/x86/include/arch/processor.h | 2 +- > include/xen/hvm/params.h | 2 +- > include/xtf/console.h | 2 +- > include/xtf/extable.h | 4 ++-- > 4 files changed, 5

[PATCH] Fix some typos in comments

2024-02-01 Thread Frediano Ziglio
Signed-off-by: Frediano Ziglio --- arch/x86/include/arch/processor.h | 2 +- include/xen/hvm/params.h | 2 +- include/xtf/console.h | 2 +- include/xtf/extable.h | 4 ++-- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git

Re: [PATCH v6 09/15] xen/page_alloc: introduce preserved page flags macro

2024-02-01 Thread Carlo Nonato
Hi Jan, On Thu, Feb 1, 2024 at 3:24 PM Jan Beulich wrote: > > On 29.01.2024 18:18, Carlo Nonato wrote: > > PGC_static and PGC_extra are flags that needs to be preserved when assigning > > a page. Define a new macro that groups those flags and use it instead of > > or'ing every time. > > While

Re: [PATCH v6 09/15] xen/page_alloc: introduce preserved page flags macro

2024-02-01 Thread Jan Beulich
On 29.01.2024 18:18, Carlo Nonato wrote: > PGC_static and PGC_extra are flags that needs to be preserved when assigning > a page. Define a new macro that groups those flags and use it instead of > or'ing every time. While here you say where the "preserving" applies, ... > ---

Re: [PATCH v6 08/15] xen/page_alloc: introduce init_free_page_fields() helper

2024-02-01 Thread Jan Beulich
On 29.01.2024 18:18, Carlo Nonato wrote: > Introduce a new helper to initialize fields that have different uses for > free pages. > > Signed-off-by: Carlo Nonato Acked-by: Jan Beulich

Re: [PATCH v6 07/15] xen/arm: add support for cache coloring configuration via device-tree

2024-02-01 Thread Jan Beulich
On 29.01.2024 18:18, Carlo Nonato wrote: > @@ -950,6 +951,11 @@ void __init create_domUs(void) > #endif > } > > +dt_property_read_string(node, "llc-colors", _colors_str); > +if ( !llc_coloring_enabled && llc_colors_str) > +printk(XENLOG_WARNING > +

Re: [PATCH v2 2/2] x86/p2m: aid the compiler in folding p2m_is_...()

2024-02-01 Thread Jan Beulich
On 01.02.2024 14:32, George Dunlap wrote: > On Thu, Jun 23, 2022 at 12:54 PM Jan Beulich wrote: > >> By using | instead of || or (in the negated form) && chances increase >> for the compiler to recognize that both predicates can actually be >> folded into an expression requiring just a single

Re: [XEN PATCH v3] xen/arm: ffa: reclaim shared memory on guest destroy

2024-02-01 Thread Bertrand Marquis
Hi Jens, > On 17 Jan 2024, at 12:06, Jens Wiklander wrote: > > When an FF-A enabled guest is destroyed it may leave behind memory > shared with SPs. This memory must be reclaimed before it's reused or an > SP may make changes to memory used by a new unrelated guest. So when the > domain is

Re: [PATCH v6 04/15] xen/arm: add Dom0 cache coloring support

2024-02-01 Thread Julien Grall
Hi Jan, On 01/02/2024 13:39, Jan Beulich wrote: On 01.02.2024 14:35, Julien Grall wrote: Hi Jan, On 01/02/2024 13:30, Jan Beulich wrote: On 29.01.2024 18:18, Carlo Nonato wrote: Add a command line parameter to allow the user to set the coloring configuration for Dom0. A common configuration

Re: [PATCH v6 05/15] xen: extend domctl interface for cache coloring

2024-02-01 Thread Jan Beulich
On 29.01.2024 18:18, Carlo Nonato wrote: > @@ -858,6 +859,16 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) > u_domctl) > __HYPERVISOR_domctl, "h", u_domctl); > break; > > +case XEN_DOMCTL_set_llc_colors: > +if ( !llc_coloring_enabled ) > +

Re: [PATCH v2 1/3] x86/PoD: simplify / improve p2m_pod_cache_add()

2024-02-01 Thread George Dunlap
On Tue, Jan 4, 2022 at 9:48 AM Jan Beulich wrote: > Avoid recurring MFN -> page or page -> MFN translations. Drop the pretty > pointless local variable "p". Make sure the MFN logged in a debugging > error message is actually the offending one. Return negative errno > values rather than -1

Re: [PATCH v6 04/15] xen/arm: add Dom0 cache coloring support

2024-02-01 Thread Jan Beulich
On 01.02.2024 14:35, Julien Grall wrote: > Hi Jan, > > On 01/02/2024 13:30, Jan Beulich wrote: >> On 29.01.2024 18:18, Carlo Nonato wrote: >>> Add a command line parameter to allow the user to set the coloring >>> configuration for Dom0. >>> A common configuration syntax for cache colors is

Re: [PATCH v6 04/15] xen/arm: add Dom0 cache coloring support

2024-02-01 Thread Julien Grall
Hi Jan, On 01/02/2024 13:30, Jan Beulich wrote: On 29.01.2024 18:18, Carlo Nonato wrote: Add a command line parameter to allow the user to set the coloring configuration for Dom0. A common configuration syntax for cache colors is introduced and documented. Take the opportunity to also add: -

Re: [PATCH v2 2/2] x86/p2m: aid the compiler in folding p2m_is_...()

2024-02-01 Thread George Dunlap
On Thu, Jun 23, 2022 at 12:54 PM Jan Beulich wrote: > By using | instead of || or (in the negated form) && chances increase > for the compiler to recognize that both predicates can actually be > folded into an expression requiring just a single branch (via OR-ing > together the respective

Re: [PATCH v6 01/15] xen/common: add cache coloring common code

2024-02-01 Thread Jan Beulich
On 29.01.2024 18:17, Carlo Nonato wrote: > --- a/xen/include/xen/sched.h > +++ b/xen/include/xen/sched.h > @@ -626,6 +626,11 @@ struct domain > > /* Holding CDF_* constant. Internal flags for domain creation. */ > unsigned int cdf; > + > +#ifdef CONFIG_LLC_COLORING > +unsigned

Re: [PATCH v6 04/15] xen/arm: add Dom0 cache coloring support

2024-02-01 Thread Jan Beulich
On 29.01.2024 18:18, Carlo Nonato wrote: > Add a command line parameter to allow the user to set the coloring > configuration for Dom0. > A common configuration syntax for cache colors is introduced and > documented. > Take the opportunity to also add: > - default configuration notion. > -

Re: [PATCH v6 01/15] xen/common: add cache coloring common code

2024-02-01 Thread Jan Beulich
On 29.01.2024 18:17, Carlo Nonato wrote: > --- a/xen/arch/Kconfig > +++ b/xen/arch/Kconfig > @@ -31,3 +31,20 @@ config NR_NUMA_NODES > associated with multiple-nodes management. It is the upper bound of > the number of NUMA nodes that the scheduler, memory allocation and >

Re: [BUG]i2c_hid_acpi broken with 4.17.2 on Framework Laptop 13 AMD

2024-02-01 Thread Sébastien Chaumat
I spotted the following warning for IRQ7 (along with IRQ6 and 10) [0.686073] fedora kernel: __irq_set_trigger: genirq: No set_type function for IRQ 7 (IR-IO-APIC) This comes from kernel/irq/manage.c int __irq_set_trigger(struct irq_desc *desc, unsigned long flags) { struct irq_chip *chip =

Re: [PATCH 1/2] xen/arm: Add imx8q{m,x} platform glue

2024-02-01 Thread Julien Grall
On 31/01/2024 15:32, John Ernberg wrote: Hi Julien, Hi John, On 1/31/24 13:22, Julien Grall wrote: Hi, On 31/01/2024 11:50, John Ernberg wrote: When using Linux for dom0 there are a bunch of drivers that need to do SMC SIP calls into the PSCI provider to enable certain hardware bits

Re: [PATCH v6 01/15] xen/common: add cache coloring common code

2024-02-01 Thread Jan Beulich
On 29.01.2024 18:17, Carlo Nonato wrote: > --- /dev/null > +++ b/docs/misc/cache-coloring.rst > @@ -0,0 +1,87 @@ > +Xen cache coloring user guide > += > + > +The cache coloring support in Xen allows to reserve Last Level Cache (LLC) > +partitions for Dom0, DomUs and Xen

Re: [PATCH v6 01/15] xen/common: add cache coloring common code

2024-02-01 Thread Jan Beulich
On 31.01.2024 16:57, Jan Beulich wrote: > On 29.01.2024 18:17, Carlo Nonato wrote: >> +Command line parameters >> +*** >> + >> +More specific documentation is available at >> `docs/misc/xen-command-line.pandoc`. >> + >> ++--+---+

Re: [PATCH v1 0/2] tools/ocaml: support OCaml 5.x, drop support for <=4.05

2024-02-01 Thread Edwin Torok
> On 31 Jan 2024, at 10:55, Andrew Cooper wrote: > > On 31/01/2024 10:44 am, Christian Lindig wrote: >>> On 31 Jan 2024, at 10:42, Edwin Török wrote: >>> >>> Fix building oxenstored with OCaml 5.x. >>> OCaml 5.x has removed some functions that have been deprecated for many >>> years, >>>

Re: [PATCH v4 3/8] VMX: tertiary execution control infrastructure

2024-02-01 Thread Jan Beulich
On 01.02.2024 12:50, Roger Pau Monné wrote: > On Thu, Jan 11, 2024 at 10:00:10AM +0100, Jan Beulich wrote: >> @@ -503,6 +538,9 @@ static int vmx_init_vmcs_config(bool bsp >> "Secondary Exec Control", >> vmx_secondary_exec_control, _vmx_secondary_exec_control); >>

Re: [PATCH v4 3/8] VMX: tertiary execution control infrastructure

2024-02-01 Thread Roger Pau Monné
On Thu, Jan 11, 2024 at 10:00:10AM +0100, Jan Beulich wrote: > This is a prereq to enabling the MSRLIST feature. > > Note that the PROCBASED_CTLS3 MSR is different from other VMX feature > reporting MSRs, in that all 64 bits report allowed 1-settings. > > vVMX code is left alone, though, for the

Re: Issue iommu unrecognized on amd computer

2024-02-01 Thread Jan Beulich
On 01.02.2024 09:16, o...@proton.me wrote: > Following our interaction on matrix, I send you the boot log `xl dmesg` > output of my computer, booting with `iommu=debug` options on linux > 6.6.13-200.fc39. There's no "iommu=debug" anywhere in sight: (XEN) Command line: placeholder no-real-mode

Re: [PATCH] xen/bitmap: Consistently use unsigned bits values

2024-02-01 Thread Andrew Cooper
On 01/02/2024 10:45 am, Jan Beulich wrote: > On 01.02.2024 11:33, Andrew Cooper wrote: >> Right now, most of the static inline helpers take an unsigned nbits quantity, >> and most of the library functions take a signed quanity. Because >> BITMAP_LAST_WORD_MASK() is expressed as a divide, the

Upcoming Social Event - Location!

2024-02-01 Thread Kelly Choi
Hi all, I'm pleased to announce the location of our next social event! Join and chat with the Xen community, there will also be free food and drinks. *Date:* Wednesday 21st February 2024 *Time:* 5:30pm - 9pm (you are welcome to stay later if you wish) *Location:* The Portland Arms 129

Re: [PATCH] xen/bitmap: Drop unused headers

2024-02-01 Thread Jan Beulich
On 01.02.2024 11:35, Andrew Cooper wrote: > Nothing in bitmap.h uses lib.h, and there's no point including types.h when we > need to include bitops.h anyway. > > Signed-off-by: Andrew Cooper Acked-by: Jan Beulich

Re: [PATCH] xen/bitmap: Consistently use unsigned bits values

2024-02-01 Thread Jan Beulich
On 01.02.2024 11:33, Andrew Cooper wrote: > Right now, most of the static inline helpers take an unsigned nbits quantity, > and most of the library functions take a signed quanity. Because > BITMAP_LAST_WORD_MASK() is expressed as a divide, the compiler is forced to > emit two different paths to

[PATCH] xen/bitmap: Drop unused headers

2024-02-01 Thread Andrew Cooper
Nothing in bitmap.h uses lib.h, and there's no point including types.h when we need to include bitops.h anyway. Signed-off-by: Andrew Cooper --- CC: George Dunlap CC: Jan Beulich CC: Stefano Stabellini CC: Wei Liu CC: Julien Grall --- xen/include/xen/bitmap.h | 2 -- 1 file changed, 2

[PATCH] xen/bitmap: Consistently use unsigned bits values

2024-02-01 Thread Andrew Cooper
Right now, most of the static inline helpers take an unsigned nbits quantity, and most of the library functions take a signed quanity. Because BITMAP_LAST_WORD_MASK() is expressed as a divide, the compiler is forced to emit two different paths to get the correct semantics for signed division.

Re: [PATCH v4 37/47] hw/net/lasi_i82596: Re-enable build

2024-02-01 Thread Thomas Huth
On 26/01/2024 18.25, David Woodhouse wrote: From: David Woodhouse When converting to the shiny build-system-du-jour, a typo prevented the last_i82596 driver from being built. Correct the config option name to re-enable the build. And include "sysemu/sysemu.h" so it actually builds. Fixes:

Re: [RFC KERNEL PATCH v4 3/3] PCI/sysfs: Add gsi sysfs for pci_dev

2024-02-01 Thread Roger Pau Monné
On Wed, Jan 31, 2024 at 01:00:14PM -0600, Bjorn Helgaas wrote: > On Wed, Jan 31, 2024 at 09:58:19AM +0100, Roger Pau Monné wrote: > > On Tue, Jan 30, 2024 at 02:44:03PM -0600, Bjorn Helgaas wrote: > > > On Tue, Jan 30, 2024 at 10:07:36AM +0100, Roger Pau Monné wrote: > > > > On Mon, Jan 29, 2024

Issue iommu unrecognized on amd computer

2024-02-01 Thread oxjo
Hi, Following our interaction on matrix, I send you the boot log `xl dmesg` output of my computer, booting with `iommu=debug` options on linux 6.6.13-200.fc39. My issue is everything works on qubes on my thinkpad L15 gen 4 with AMD Ryzen 7 Pro 7730U, except iommu/amd-vi. I can boot and use a

Re: [PATCH] shim: avoid building of vendor IOMMU code

2024-02-01 Thread Roger Pau Monné
On Thu, Feb 01, 2024 at 08:39:31AM +0100, Jan Beulich wrote: > There's no use for IOMMU code in the shim. Disable at least the vendor- > specific code, until eventually IOMMU code can be disabled altogether. > > Signed-off-by: Jan Beulich Acked-by: Roger Pau Monné That was easier than I

Re: [PATCH v12 10/15] vpci/header: emulate PCI_COMMAND register for guests

2024-02-01 Thread Jan Beulich
On 01.02.2024 05:50, Stewart Hildebrand wrote: > On 1/25/24 10:43, Jan Beulich wrote: >> On 09.01.2024 22:51, Stewart Hildebrand wrote: >>> --- a/xen/drivers/vpci/header.c >>> +++ b/xen/drivers/vpci/header.c >>> @@ -168,6 +168,9 @@ static void modify_decoding(const struct pci_dev *pdev, >>>