[GIT PULL] xen: branch for v6.14-rc2

2025-02-06 Thread Juergen Gross
+++ 1 file changed, 3 insertions(+), 8 deletions(-) Juergen Gross (3): x86/xen: fix xen_hypercall_hvm() to not clobber %rbx x86/xen: add FRAME_END to xen_hypercall_hvm() x86/xen: remove unneeded dummy push from xen_hypercall_hvm()

[PATCH v2 3/3] x86/xen: remove unneeded dummy push from xen_hypercall_hvm()

2025-02-05 Thread Juergen Gross
Stack alignment of the kernel in 64-bit mode is 8, not 16, so the dummy push in xen_hypercall_hvm() for aligning the stack to 16 bytes can be removed. Signed-off-by: Juergen Gross --- arch/x86/xen/xen-head.S | 6 -- 1 file changed, 6 deletions(-) diff --git a/arch/x86/xen/xen-head.S b/arch

[PATCH v2 2/3] x86/xen: add FRAME_END to xen_hypercall_hvm()

2025-02-05 Thread Juergen Gross
xen_hypercall_hvm() is missing a FRAME_END at the end, add it. Reported-by: kernel test robot Closes: https://lore.kernel.org/oe-kbuild-all/202502030848.htnttuo9-...@intel.com/ Fixes: b4845bb63838 ("x86/xen: add central hypercall functions") Signed-off-by: Juergen Gross --- arch/x

[PATCH v2 1/3] x86/xen: fix xen_hypercall_hvm() to not clobber %rbx

2025-02-05 Thread Juergen Gross
using an already saved register instead of %rbx. Fixes: b4845bb63838 ("x86/xen: add central hypercall functions") Signed-off-by: Juergen Gross --- V2: - use %rcx instead of %rbx, keeping the lea instruction (Jan Beulich) --- arch/x86/xen/xen-head.S | 4 ++-- 1 file changed, 2 insert

[PATCH v2 0/3] x86/xen: some xen_hypercall_hvm() fixes

2025-02-05 Thread Juergen Gross
3 fixes of the xen_hypercall_hvm() function, with the last one being probably more a cleanup. Juergen Gross (3): x86/xen: fix xen_hypercall_hvm() to not clobber %rbx x86/xen: add FRAME_END to xen_hypercall_hvm() x86/xen: remove unneeded dummy push from xen_hypercall_hvm() arch/x86/xen/xen

[PATCH] x86/xen: fix xen_hypercall_hvm() to not clobber %rbx

2025-02-05 Thread Juergen Gross
not modifying %rbx in xen_hypercall_hvm(). Fixes: b4845bb63838 ("x86/xen: add central hypercall functions") Signed-off-by: Juergen Gross --- arch/x86/xen/xen-head.S | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/arch/x86/xen/xen-head.S b/arch/x86/xen/xen-he

[PATCH] x86/xen: add FRAME_END to xen_hypercall_hvm()

2025-02-05 Thread Juergen Gross
xen_hypercall_hvm() is missing a FRAME_END at the end, add it. Reported-by: kernel test robot Closes: https://lore.kernel.org/oe-kbuild-all/202502030848.htnttuo9-...@intel.com/ Fixes: b4845bb63838 ("x86/xen: add central hypercall functions") Signed-off-by: Juergen Gross --- arch/x

[PATCH v8 9/9] tools/xenstored: use xenmanage_poll_changed_domain()

2025-02-04 Thread Juergen Gross
pu time of xenstored by 6% with this change applied. Signed-off-by: Juergen Gross --- V8: - new patch --- tools/xenstored/domain.c | 64 +--- 1 file changed, 46 insertions(+), 18 deletions(-) diff --git a/tools/xenstored/domain.c b/tools/xenstored/domain.c index

[PATCH v8 8/9] tools/xenstored: use unique_id to identify new domain with same domid

2025-02-04 Thread Juergen Gross
Use the new unique_id of a domain in order to detect that a domain has been replaced with another one reusing the doamin-id of the old domain. Signed-off-by: Juergen Gross --- V8: - new patch --- tools/xenstored/domain.c | 53 +++- tools/xenstored

[PATCH v8 7/9] docs: update xenstore migration stream definition

2025-02-04 Thread Juergen Gross
In order to close a race window for Xenstore live update when using the new unique_id of domains, the migration stream needs to contain this unique_id for each domain known by Xenstore. Signed-off-by: Juergen Gross --- V8: - new patch --- docs/designs/xenstore-migration.md | 14

[PATCH v8 6/9] tools/xenstored: use new stable interface instead of libxenctrl

2025-02-04 Thread Juergen Gross
direct replacement without using the functionality of obtaining information about domains having changed the state. Signed-off-by: Juergen Gross Reviewed-by: Samuel Thibault Reviewed-by: Anthony PERARD --- V1: - use library instead of direct hypercall, only replace current libxenctrl use case

[PATCH v8 4/9] xen: add new domctl get_changed_domain

2025-02-04 Thread Juergen Gross
this domctl stable. For stable domctls the interface_version is always 0. Signed-off-by: Juergen Gross Acked-by: Daniel P. Smith Reviewed-by: Jan Beulich --- V1: - use a domctl subop for the new interface (Jan Beulich) V2: - fix XSM hooks (Daniel P. Smith) - remove versioning of stable sub-ops

[PATCH v8 2/9] xen/events: allow setting of global virq handler only for unbound virqs

2025-02-04 Thread Juergen Gross
only if the virq in question is not bound by the current domain allowed to use it. Currently the only user of XEN_DOMCTL_set_virq_handler in the Xen code base is init-xenstore-domain, so changing the behavior like above will not cause any problems. Signed-off-by: Juergen Gross --- V6: - new patch

[PATCH v8 5/9] tools/libs: add a new libxenmanage library

2025-02-04 Thread Juergen Gross
In order to have a stable interface in user land for using stable domctl and possibly later sysctl interfaces, add a new library libxenmanage. Signed-off-by: Juergen Gross Reviewed-by: Anthony PERARD --- V1: - new patch V2: - define __XEN_TOOLS__ via Makefile (Anthony PERARD) - use SPDX in

[PATCH v8 3/9] xen: add bitmap to indicate per-domain state changes

2025-02-04 Thread Juergen Gross
is tightly coupled with the VIRQ_DOM_EXC event, it is meant to be used only by a single consumer in the system, just like the VIRQ_DOM_EXC event. Resetting a bit will be done in a future patch. This information is needed for Xenstore to keep track of all domains. Signed-off-by: Juergen Gross

[PATCH v8 0/9] remove libxenctrl usage from xenstored

2025-02-04 Thread Juergen Gross
comment by Jan Beulich) - rework of locking in patch 4 (Jan Beulich) Changes in V7: - addressed comments - rebase Changes in V8: - patch 1 of v7 has gone in - addressed comments - new patches 7-9 using the new unique_id and xenmanage_poll_changed_domain() Juergen Gross (9): xen/events: don

[PATCH v8 1/9] xen/events: don't allow binding a global virq from any domain

2025-02-04 Thread Juergen Gross
the domain isn't set to handle that virq. Note that this check is inside the write_lock() on purpose, as a future patch will put a related check into set_global_virq_handler() with the addition of using the same lock. Signed-off-by: Juergen Gross --- V6: - new patch V7: - move handling domain chec

Re: [PATCH v2 00/14] meson: Deprecate 32-bit host support

2025-02-04 Thread Juergen Gross
On 03.02.25 23:43, Stefano Stabellini wrote: +Xen maintainers On Mon, 3 Feb 2025, Richard Henderson wrote: On 2/3/25 04:54, Paolo Bonzini wrote: On 2/3/25 04:18, Richard Henderson wrote: v1: 20250128004254.33442-1-richard.hender...@linaro.org For v2, immediately disable 64-on-32 TCG. I *su

[GIT PULL] xen: branch for v6.14-rc1

2025-01-29 Thread Juergen Gross
Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-6.14-rc1-tag xen: branch for v6.14-rc1 It contains 3 minor fixes. Thanks. Juergen arch/x86/xen/mmu_pv.c | 4 drivers/xen/pcpu.c | 2 +- drivers/xen/pvcalls-

Re: v5.4.289 failed to boot with error megasas_build_io_fusion 3219 sge_count (-12) is out of range

2025-01-29 Thread Juergen Gross
On 29.01.25 10:15, Harshvardhan Jha wrote: On 29/01/25 2:34 PM, Greg KH wrote: On Wed, Jan 29, 2025 at 02:29:48PM +0530, Harshvardhan Jha wrote: Hi Greg, On 29/01/25 2:18 PM, Greg KH wrote: On Wed, Jan 29, 2025 at 02:13:34PM +0530, Harshvardhan Jha wrote: Hi there, On 29/01/25 2:05 PM, Gre

Re: [PATCH v3] xen: update pvcalls_front_accept prototype

2025-01-20 Thread Juergen Gross
On 10.01.25 20:18, Stefano Stabellini wrote: While currently there are no in-tree callers of these functions, it is best to keep them up-to-date with the latest network API. Signed-off-by: Stefano Stabellini What are your future plans regarding usage of this function? I guess you are looking

[PATCH v7 6/7] tools/libs: add a new libxenmanage library

2025-01-09 Thread Juergen Gross
In order to have a stable interface in user land for using stable domctl and possibly later sysctl interfaces, add a new library libxenmanage. Signed-off-by: Juergen Gross Reviewed-by: Anthony PERARD --- V1: - new patch V2: - define __XEN_TOOLS__ via Makefile (Anthony PERARD) - use SPDX in

[PATCH v7 7/7] tools/xenstored: use new stable interface instead of libxenctrl

2025-01-09 Thread Juergen Gross
direct replacement without using the functionality of obtaining information about domains having changed the state. Signed-off-by: Juergen Gross Reviewed-by: Samuel Thibault --- V1: - use library instead of direct hypercall, only replace current libxenctrl use case Please note that this patch can

[PATCH v7 5/7] xen: add new domctl get_changed_domain

2025-01-09 Thread Juergen Gross
this domctl stable. For stable domctls the interface_version is always 0. Signed-off-by: Juergen Gross Acked-by: Daniel P. Smith --- V1: - use a domctl subop for the new interface (Jan Beulich) V2: - fix XSM hooks (Daniel P. Smith) - remove versioning of stable sub-ops (Jan Beulich) - use

[PATCH v7 3/7] xen/events: allow setting of global virq handler only for unbound virqs

2025-01-09 Thread Juergen Gross
only if the virq in question is not bound by the current domain allowed to use it. Currently the only user of XEN_DOMCTL_set_virq_handler in the Xen code base is init-xenstore-domain, so changing the behavior like above will not cause any problems. Signed-off-by: Juergen Gross --- V6: - new patch

[PATCH v7 4/7] xen: add bitmap to indicate per-domain state changes

2025-01-09 Thread Juergen Gross
is tightly coupled with the VIRQ_DOM_EXC event, it is meant to be used only by a single consumer in the system, just like the VIRQ_DOM_EXC event. Resetting a bit will be done in a future patch. This information is needed for Xenstore to keep track of all domains. Signed-off-by: Juergen Gross

[PATCH v7 2/7] xen/events: don't allow binding a global virq from any domain

2025-01-09 Thread Juergen Gross
the domain isn't set to handle that virq. Note that this check is inside the write_lock() on purpose, as a future patch will put a related check into set_global_virq_handler() with the addition of using the same lock. Signed-off-by: Juergen Gross --- V6: - new patch V7: - move handling domain chec

[PATCH v7 0/7] remove libxenctrl usage from xenstored

2025-01-09 Thread Juergen Gross
r fixing a race and avoiding new races with the added functionality (result of a comment by Jan Beulich) - rework of locking in patch 4 (Jan Beulich) Changes in V7: - addressed comments - rebase Juergen Gross (7): xen/events: fix race with set_global_virq_handler() xen/events: don't allow b

[PATCH v7 1/7] xen/events: fix race with set_global_virq_handler()

2025-01-09 Thread Juergen Gross
r domains") Signed-off-by: Juergen Gross --- V6: - new patch V7: - add comment (Jan Beulich) --- xen/common/event_channel.c | 25 ++--- 1 file changed, 22 insertions(+), 3 deletions(-) diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c index 8db2ca4ba2..46

Re: [PATCH v6 5/7] xen: add new domctl get_changed_domain

2025-01-07 Thread Juergen Gross
On 07.01.25 18:06, Jan Beulich wrote: On 07.01.2025 17:48, Jürgen Groß wrote: On 07.01.25 17:28, Jan Beulich wrote: On 07.01.2025 11:17, Juergen Gross wrote: --- a/xen/common/domain.c +++ b/xen/common/domain.c @@ -185,6 +185,76 @@ static void domain_changed_state(const struct domain *d

Re: [PATCH v6 1/7] xen/events: fix race with set_global_virq_handler()

2025-01-07 Thread Juergen Gross
On 07.01.25 16:49, Jan Beulich wrote: On 07.01.2025 16:37, Juergen Gross wrote: On 07.01.25 16:23, Jan Beulich wrote: On 07.01.2025 11:17, Juergen Gross wrote: --- a/xen/common/event_channel.c +++ b/xen/common/event_channel.c @@ -979,6 +979,7 @@ void send_global_virq(uint32_t virq) int

Re: [PATCH v6 1/7] xen/events: fix race with set_global_virq_handler()

2025-01-07 Thread Juergen Gross
On 07.01.25 16:23, Jan Beulich wrote: On 07.01.2025 11:17, Juergen Gross wrote: --- a/xen/common/event_channel.c +++ b/xen/common/event_channel.c @@ -979,6 +979,7 @@ void send_global_virq(uint32_t virq) int set_global_virq_handler(struct domain *d, uint32_t virq) { struct domain *old

[PATCH v6 2/7] xen/events: don't allow binding a global virq from any domain

2025-01-07 Thread Juergen Gross
the domain isn't set to handle that virq. Signed-off-by: Juergen Gross --- V6: - new patch --- xen/common/event_channel.c | 20 +++- 1 file changed, 15 insertions(+), 5 deletions(-) diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c index f2b64c48fb..62060dc6

[PATCH v6 7/7] tools/xenstored: use new stable interface instead of libxenctrl

2025-01-07 Thread Juergen Gross
direct replacement without using the functionality of obtaining information about domains having changed the state. Signed-off-by: Juergen Gross Reviewed-by: Samuel Thibault --- V1: - use library instead of direct hypercall, only replace current libxenctrl use case Please note that this patch can

[PATCH v6 4/7] xen: add bitmap to indicate per-domain state changes

2025-01-07 Thread Juergen Gross
is tightly coupled with the VIRQ_DOM_EXC event, it is meant to be used only by a single consumer in the system, just like the VIRQ_DOM_EXC event. Resetting a bit will be done in a future patch. This information is needed for Xenstore to keep track of all domains. Signed-off-by: Juergen Gross

[PATCH v6 6/7] tools/libs: add a new libxenmanage library

2025-01-07 Thread Juergen Gross
In order to have a stable interface in user land for using stable domctl and possibly later sysctl interfaces, add a new library libxenmanage. Signed-off-by: Juergen Gross Reviewed-by: Anthony PERARD --- V1: - new patch V2: - define __XEN_TOOLS__ via Makefile (Anthony PERARD) - use SPDX in

[PATCH v6 5/7] xen: add new domctl get_changed_domain

2025-01-07 Thread Juergen Gross
this domctl stable. For stable domctls the interface_version is always 0. Signed-off-by: Juergen Gross Acked-by: Daniel P. Smith --- V1: - use a domctl subop for the new interface (Jan Beulich) V2: - fix XSM hooks (Daniel P. Smith) - remove versioning of stable sub-ops (Jan Beulich) - use

[PATCH v6 0/7] remove libxenctrl usage from xenstored

2025-01-07 Thread Juergen Gross
r fixing a race and avoiding new races with the added functionality (result of a comment by Jan Beulich) - rework of locking in patch 4 (Jan Beulich) Juergen Gross (7): xen/events: fix race with set_global_virq_handler() xen/events: don't allow binding a global virq from any domain xe

[PATCH v6 1/7] xen/events: fix race with set_global_virq_handler()

2025-01-07 Thread Juergen Gross
r domains") Signed-off-by: Juergen Gross --- V6: - new patch --- xen/common/event_channel.c | 16 +--- 1 file changed, 13 insertions(+), 3 deletions(-) diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c index 8db2ca4ba2..f2b64c48fb 100644 --- a/xen/common/event_chan

[PATCH v6 3/7] xen/events: allow setting of global virq handler only for unbound virqs

2025-01-07 Thread Juergen Gross
only if the virq in question is not bound by the current domain allowed to use it. Currently the only user of XEN_DOMCTL_set_virq_handler in the Xen code base is init-xenstore-domain, so changing the behavior like above will not cause any problems. Signed-off-by: Juergen Gross --- V6: - new patch

Re: [PATCH v5 2/5] xen: add bitmap to indicate per-domain state changes

2025-01-06 Thread Juergen Gross
On 19.12.24 09:01, Jan Beulich wrote: On 18.12.2024 08:15, Jürgen Groß wrote: On 17.12.24 17:12, Jan Beulich wrote: On 17.12.2024 16:55, Jürgen Groß wrote: On 17.12.24 16:19, Jan Beulich wrote: On 17.12.2024 15:22, Juergen Gross wrote: Add a bitmap with one bit per possible domid indicating

Re: Linux 6.13-rc3 many different panics in Xen PV dom0

2025-01-02 Thread Juergen Gross
On 02.01.25 11:20, Jürgen Groß wrote: On 19.12.24 17:14, Marek Marczykowski-Górecki wrote: Hi, It crashes on boot like below, most of the times. But sometimes (rarely) it manages to stay alive. Below I'm pasting few of the crashes that look distinctly different, if you follow the links, you can

[PATCH v5 3/5] xen: add new domctl get_changed_domain

2024-12-17 Thread Juergen Gross
this domctl stable. For stable domctls the interface_version is always 0. Signed-off-by: Juergen Gross --- V1: - use a domctl subop for the new interface (Jan Beulich) V2: - fix XSM hooks (Daniel P. Smith) - remove versioning of stable sub-ops (Jan Beulich) - use domctl.domain for retuning domid

[PATCH v5 4/5] tools/libs: add a new libxenmanage library

2024-12-17 Thread Juergen Gross
In order to have a stable interface in user land for using stable domctl and possibly later sysctl interfaces, add a new library libxenmanage. Signed-off-by: Juergen Gross Reviewed-by: Anthony PERARD --- V1: - new patch V2: - define __XEN_TOOLS__ via Makefile (Anthony PERARD) - use SPDX in

[PATCH v5 2/5] xen: add bitmap to indicate per-domain state changes

2024-12-17 Thread Juergen Gross
is tightly coupled with the VIRQ_DOM_EXC event, it is meant to be used only by a single consumer in the system, just like the VIRQ_DOM_EXC event. Resetting a bit will be done in a future patch. This information is needed for Xenstore to keep track of all domains. Signed-off-by: Juergen Gross

[PATCH v5 5/5] tools/xenstored: use new stable interface instead of libxenctrl

2024-12-17 Thread Juergen Gross
direct replacement without using the functionality of obtaining information about domains having changed the state. Signed-off-by: Juergen Gross Reviewed-by: Samuel Thibault --- V1: - use library instead of direct hypercall, only replace current libxenctrl use case Please note that this patch can

[PATCH v5 0/5] remove libxenctrl usage from xenstored

2024-12-17 Thread Juergen Gross
Changes in V4: - patches 1 and 3 of V3 dropped, as already committed - addressed comments Changes in V5: - addressed comments Juergen Gross (5): tools: add a dedicated header file for barrier definitions xen: add bitmap to indicate per-domain state changes xen: add new domctl get_changed_doma

[PATCH v5 1/5] tools: add a dedicated header file for barrier definitions

2024-12-17 Thread Juergen Gross
Instead of having to include xenctrl.h for getting definitions of cpu barriers, add a dedicated header for that purpose. Switch the xen-9pfsd daemon to use the new header instead of xenctrl.h. This is in preparation of making Xenstore independent from libxenctrl. Signed-off-by: Juergen Gross

[PATCH v4 3/5] xen: add new domctl get_changed_domain

2024-12-17 Thread Juergen Gross
this domctl stable. For stable domctls the interface_version is always 0. Signed-off-by: Juergen Gross --- V1: - use a domctl subop for the new interface (Jan Beulich) V2: - fix XSM hooks (Daniel P. Smith) - remove versioning of stable sub-ops (Jan Beulich) - use domctl.domain for retuning domid

[PATCH v4 1/5] tools: add a dedicated header file for barrier definitions

2024-12-17 Thread Juergen Gross
Instead of having to include xenctrl.h for getting definitions of cpu barriers, add a dedicated header for that purpose. Switch the xen-9pfsd daemon to use the new header instead of xenctrl.h. This is in preparation of making Xenstore independent from libxenctrl. Signed-off-by: Juergen Gross

[PATCH v4 5/5] tools/xenstored: use new stable interface instead of libxenctrl

2024-12-17 Thread Juergen Gross
direct replacement without using the functionality of obtaining information about domains having changed the state. Signed-off-by: Juergen Gross Reviewed-by: Samuel Thibault --- V1: - use library instead of direct hypercall, only replace current libxenctrl use case Please note that this patch can

[PATCH v4 4/5] tools/libs: add a new libxenmanage library

2024-12-17 Thread Juergen Gross
In order to have a stable interface in user land for using stable domctl and possibly later sysctl interfaces, add a new library libxenmanage. Signed-off-by: Juergen Gross Reviewed-by: Anthony PERARD --- V1: - new patch V2: - define __XEN_TOOLS__ via Makefile (Anthony PERARD) - use SPDX in

[PATCH v4 2/5] xen: add bitmap to indicate per-domain state changes

2024-12-17 Thread Juergen Gross
is tightly coupled with the VIRQ_DOM_EXC event, it is meant to be used only by a single consumer in the system, just like the VIRQ_DOM_EXC event. Resetting a bit will be done in a future patch. This information is needed for Xenstore to keep track of all domains. Signed-off-by: Juergen Gross

[PATCH v4 0/5] remove libxenctrl usage from xenstored

2024-12-17 Thread Juergen Gross
Changes in V4: - patches 1 and 3 of V3 dropped, as already committed - addressed comments Juergen Gross (5): tools: add a dedicated header file for barrier definitions xen: add bitmap to indicate per-domain state changes xen: add new domctl get_changed_domain tools/libs: add a new libxenmana

Re: [PATCH v3 6/7] tools/libs: add a new libxenmanage library

2024-12-16 Thread Juergen Gross
On 16.12.24 15:49, Anthony PERARD wrote: On Fri, Dec 13, 2024 at 05:24:20PM +0100, Juergen Gross wrote: diff --git a/tools/include/xenmanage.h b/tools/include/xenmanage.h new file mode 100644 index 00..5d169693b0 --- /dev/null +++ b/tools/include/xenmanage.h @@ -0,0 +1,92 @@ +/* SPDX

Re: [PATCH v3 5/7] xen: add new domctl get_changed_domain

2024-12-16 Thread Juergen Gross
On 16.12.24 11:41, Jan Beulich wrote: On 13.12.2024 17:24, Juergen Gross wrote: --- a/xen/common/domain.c +++ b/xen/common/domain.c @@ -193,6 +193,57 @@ static void domain_changed_state(const struct domain *d) spin_unlock(&dom_state_changed_lock); } +static void set_domain_state_

[PATCH v3 7/7] tools/xenstored: use new stable interface instead of libxenctrl

2024-12-13 Thread Juergen Gross
direct replacement without using the functionality of obtaining information about domains having changed the state. Signed-off-by: Juergen Gross Reviewed-by: Samuel Thibault --- V1: - use library instead of direct hypercall, only replace current libxenctrl use case Please note that this patch can

[PATCH v3 6/7] tools/libs: add a new libxenmanage library

2024-12-13 Thread Juergen Gross
In order to have a stable interface in user land for using stable domctl and possibly later sysctl interfaces, add a new library libxenmanage. Signed-off-by: Juergen Gross --- V1: - new patch V2: - define __XEN_TOOLS__ via Makefile (Anthony PERARD) - use SPDX in header file (Anthony PERARD

[PATCH v3 4/7] xen: add bitmap to indicate per-domain state changes

2024-12-13 Thread Juergen Gross
is tightly coupled with the VIRQ_DOM_EXC event, it is meant to be used only by a single consumer in the system, just like the VIRQ_DOM_EXC event. Resetting a bit will be done in a future patch. This information is needed for Xenstore to keep track of all domains. Signed-off-by: Juergen Gross

[PATCH v3 5/7] xen: add new domctl get_changed_domain

2024-12-13 Thread Juergen Gross
this domctl stable. For stable domctls the interface_version is always 0. Signed-off-by: Juergen Gross --- V1: - use a domctl subop for the new interface (Jan Beulich) V2: - fix XSM hooks (Daniel P. Smith) - remove versioning of stable sub-ops (Jan Beulich) - use domctl.domain for retuning domid

[PATCH v3 3/7] xen: add a domain unique id to each domain

2024-12-13 Thread Juergen Gross
igned-off-by: Juergen Gross Reviewed-by: Jan Beulich Reviewed-by: Alejandro Vallejo --- V1: - make unique_id local to function (Jan Beulich) - add lock (Julien Grall) - add comment (Julien Grall) V2: - move reading unique_id into locked section (Julien Grall) - add comment (Alejandro Vallejo) ---

[PATCH v3 1/7] xen/xsm: make getdomaininfo xsm dummy checks more stringent

2024-12-13 Thread Juergen Gross
, which is the privilege really wanted. Note that this test is still wider than the sysctl entry test, but there is no easy way to make both domctl and sysctl happy at the same time. Signed-off-by: Juergen Gross Acked-by: Daniel P. Smith --- V2: - new patch --- xen/common/domctl.c | 2 +-

[PATCH v3 0/7] remove libxenctrl usage from xenstored

2024-12-13 Thread Juergen Gross
been Acked already, so it can go in as soon as patch 6 of this series (the one introducing libxenmanage) has been committed. Changes in V2: - new patch 1 - former patch 5 mover earlier, now patch 2 (can go in without the rest of the series) - addressed comments Changes in V3: - addressed comment

[PATCH v3 2/7] tools: add a dedicated header file for barrier definitions

2024-12-13 Thread Juergen Gross
Instead of having to include xenctrl.h for getting definitions of cpu barriers, add a dedicated header for that purpose. Switch the xen-9pfsd daemon to use the new header instead of xenctrl.h. This is in preparation of making Xenstore independent from libxenctrl. Signed-off-by: Juergen Gross

Re: [PATCH] x86/xen/mmu: Increase MAX_CONTIG_ORDER

2024-12-12 Thread Juergen Gross
On 12.12.24 11:22, Jan Beulich wrote: On 11.12.2024 19:20, Thierry Escande wrote: Hi Jan, On 09/12/2024 11:04, Jan Beulich wrote: On 04.12.2024 18:14, Thierry Escande wrote: With change 9f40ec84a797 (xen/swiotlb: add alignment check for dma buffers), the driver mpt3sas fails to load because i

Re: [PATCH] Grab mm lock before grabbing pt lock

2024-12-12 Thread Juergen Gross
0x10/0x10 [ 3680.685657] ret_from_fork_asm+0x1a/0x30 [ 3680.685662] [ 3680.685267] xen:grant_table: Grant tables using version 1 layout [ 3680.685921] OOM killer enabled. [ 3680.685934] Restarting tasks ... done. Signed-off-by: Maksym Planeta Reviewed-by: Juergen Gross

Re: [PATCH 0/3] virtgpu: check if P2P is possiable or not

2024-12-12 Thread Juergen Gross
On 07.12.24 11:50, Julia Zhang wrote: To implement dGPU prime feature, virtgpu needs to import/export buffer between virtio iGPU and passthrough dGPU. Before that, virtgpu should check if P2P is possible or not. But calling function pci_p2pdma_distance in guest VM will only get virtual p2pdma_dis

[PATCH v2 7/7] tools/xenstored: use new stable interface instead of libxenctrl

2024-12-06 Thread Juergen Gross
direct replacement without using the functionality of obtaining information about domains having changed the state. Signed-off-by: Juergen Gross --- V1: - use library instead of direct hypercall, only replace current libxenctrl use case Please note that this patch can be committed only after the

[PATCH v2 6/7] tools/libs: add a new libxenmanage library

2024-12-06 Thread Juergen Gross
In order to have a stable interface in user land for using stable domctl and possibly later sysctl interfaces, add a new library libxenmanage. Signed-off-by: Juergen Gross --- V1: - new patch V2: - define __XEN_TOOLS__ via Makefile (Anthony PERARD) - use SPDX in header file (Anthony PERARD

[PATCH v2 4/7] xen: add bitmap to indicate per-domain state changes

2024-12-06 Thread Juergen Gross
in a future patch. This information is needed for Xenstore to keep track of all domains. Signed-off-by: Juergen Gross --- V2: - use DOMID_FIRST_RESERVED instead of DOMID_MASK + 1 (Jan Beulich) - use const (Jan Beulich) - move call of domain_reset_states() into evtchn_bind_virq() (Jan Beulich

[PATCH v2 2/7] tools: add a dedicated header file for barrier definitions

2024-12-06 Thread Juergen Gross
Instead of having to include xenctrl.h for getting definitions of cpu barriers, add a dedicated header for that purpose. Switch the xen-9pfsd daemon to use the new header instead of xenctrl.h. This is in preparation of making Xenstore independent from libxenctrl. Signed-off-by: Juergen Gross

[PATCH v2 5/7] xen: add new domctl get_changed_domain

2024-12-06 Thread Juergen Gross
this domctl stable. For stable domctls the interface_version is always 0. Signed-off-by: Juergen Gross --- V1: - use a domctl subop for the new interface (Jan Beulich) V2: - fix XSM hooks (Daniel P. Smith) - remove versioning of stable sub-ops (Jan Beulich) - use domctl.domain for retuning domid

[PATCH v2 1/7] xen/xsm: make getdomaininfo xsm dummy checks more stringent

2024-12-06 Thread Juergen Gross
, which is the privilege really wanted. Note that this test is still wider than the sysctl entry test, but there is now easy way to make both domctl and sysctl happy at the same time. Signed-off-by: Juergen Gross --- V2: - new patch --- xen/common/domctl.c | 2 +- xen/common/sysctl.c |

[PATCH v2 3/7] xen: add a domain unique id to each domain

2024-12-06 Thread Juergen Gross
igned-off-by: Juergen Gross Reviewed-by: Jan Beulich Reviewed-by: Alejandro Vallejo --- V1: - make unique_id local to function (Jan Beulich) - add lock (Julien Grall) - add comment (Julien Grall) V2: - move reading unique_id into locked section (Julien Grall) - add comment (Alejandro Vallejo) ---

[PATCH v2 0/7] remove libxenctrl usage from xenstored

2024-12-06 Thread Juergen Gross
been Acked already, so it can go in as soon as patch 6 of this series (the one introducing libxenmanage) has been committed. Changes in V2: - new patch 1 - former patch 5 mover earlier, now patch 2 (can go in without the rest of the series) - addressed comments Juergen Gross (7): xen/xsm: make get

Re: [PATCH 3/6] xen: add new domctl get_changed_domain

2024-12-06 Thread Juergen Gross
On 04.12.24 11:01, Juergen Gross wrote: On 23.10.24 15:10, Juergen Gross wrote: Add a new domctl sub-function to get data of a domain having changed state (this is needed by Xenstore). The returned state just contains the domid, the domain unique id, and some flags (existing, shutdown, dying

Re: [PATCH 3/6] xen: add new domctl get_changed_domain

2024-12-04 Thread Juergen Gross
On 23.10.24 15:10, Juergen Gross wrote: Add a new domctl sub-function to get data of a domain having changed state (this is needed by Xenstore). The returned state just contains the domid, the domain unique id, and some flags (existing, shutdown, dying). In order to enable Xenstore stubdom

[PATCH] x86/paravirt: remove the wbinvd hook

2024-12-02 Thread Juergen Gross
The wbinvd paravirt hook is a leftover of lguest times. Today it is no longer needed, as all users use the native wbinvd implementation. Remove the hook and rename native_wbinvd() to wbinvd(). Signed-off-by: Juergen Gross --- arch/x86/include/asm/paravirt.h | 7 --- arch/x86

Re: [RFC PATCH 1/2] x86, lib, xenpv: Add WBNOINVD helper functions

2024-12-02 Thread Juergen Gross
On 03.12.24 05:09, Xin Li wrote: On 12/2/2024 5:44 PM, Kevin Loughlin wrote: On Mon, Dec 2, 2024 at 5:28 PM Andrew Cooper wrote: On 03/12/2024 12:59 am, Kevin Loughlin wrote: diff --git a/arch/x86/include/asm/paravirt.h b/arch/x86/include/asm/paravirt.h index d4eb9e1d61b8..c040af2d8eff 10064

Re: [PATCH] xen: pcpu: remove unnecessary __ref annotation

2024-12-02 Thread Juergen Gross
6c847402e1c6, but I think the need for it went away some time later. Cc: Juergen Gross Cc: Stefano Stabellini Cc: Oleksandr Tyshchenko Cc: xen-devel@lists.xenproject.org Cc: linux-ker...@vger.kernel.org Signed-off-by: Sergio Miguéns Iglesias Reviewed-by: Juergen Gross Juergen

Re: [PATCH] 9p/xen: fix init sequence

2024-11-21 Thread Juergen Gross
On 21.11.24 13:23, Dominique Martinet wrote: Alexander Merritt wrote on Tue, Nov 19, 2024 at 09:16:33PM +: From: Alex Zenla Large amount of mount hangs observed during hotplugging of 9pfs devices. The 9pfs Xen driver attempts to initialize itself more than once, causing the frontend and ba

[GIT PULL] xen: branch for v6.13-rc1

2024-11-15 Thread Juergen Gross
Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-6.13-rc1-tag xen: branch for v6.13-rc1 It contains: - a series for booting as a PVH guest, doing some cleanups after the previous work to make PVH boot code position independent -

Re: [Mini-OS PATCH] Add missing symbol exports for grub-pv

2024-10-29 Thread Juergen Gross
On 29.10.24 13:13, Andrew Cooper wrote: On 29/10/2024 12:02 pm, Jürgen Groß wrote: On 29.10.24 13:01, Andrew Cooper wrote: On 29/10/2024 11:50 am, Samuel Thibault wrote: Juergen Gross, le mar. 29 oct. 2024 12:41:58 +0100, a ecrit: Grub-pv needs start_info_union and phys_to_machine_mapping to

[Mini-OS PATCH] Add missing symbol exports for grub-pv

2024-10-29 Thread Juergen Gross
Grub-pv needs start_info_union and phys_to_machine_mapping to be accessible. Export both symbols. Fixes: 33411a11f848 ("Mini-OS: hide all symbols not exported via EXPORT_SYMBOLS()") Reported-by: Natanael Copa Signed-off-by: Juergen Gross --- arch/x86/mm.c| 1 + arch/x86/setup.

Re: [PATCH 1/6] xen: add a domain unique id to each domain

2024-10-23 Thread Juergen Gross
On 23.10.24 16:08, Alejandro Vallejo wrote: On Wed Oct 23, 2024 at 2:10 PM BST, Juergen Gross wrote: Xenstore is referencing domains by their domid, but reuse of a domid can lead to the situation that Xenstore can't tell whether a domain with that domid has been deleted and created

[MINI-OS PATCH] config: add support for libxenmanage

2024-10-23 Thread Juergen Gross
Add CONFIG_LIBXENMANAGE support. Signed-off-by: Juergen Gross --- Please note that this patch should be committed only after the related Xen patch "tools/libs: add a new libxenmanage library" has been Acked, as otherwise it should either be dropped (in case the approach of adding a n

[PATCH 6/6] tools/xenstored: use new stable interface instead of libxenctrl

2024-10-23 Thread Juergen Gross
direct replacement without using the functionality of obtaining information about domains having changed the state. Signed-off-by: Juergen Gross --- V1: - use library instead of direct hypercall, only replace current libxenctrl use case Please note that this patch can be committed only after the

[PATCH 4/6] tools/libs: add a new libxenmanage library

2024-10-23 Thread Juergen Gross
In order to have a stable interface in user land for using stable domctl and possibly later sysctl interfaces, add a new library libxenmanage. Signed-off-by: Juergen Gross --- V1: - new patch --- tools/include/xenmanage.h | 98 + tools/libs/Makefile

[PATCH 2/6] xen: add bitmap to indicate per-domain state changes

2024-10-23 Thread Juergen Gross
in a future patch. This information is needed for Xenstore to keep track of all domains. Signed-off-by: Juergen Gross --- xen/common/domain.c| 21 + xen/common/event_channel.c | 2 ++ xen/include/xen/sched.h| 2 ++ 3 files changed, 25 insertions(+) diff --git

[PATCH 0/6] remove libxenctrl usage from xenstored

2024-10-23 Thread Juergen Gross
, thus removing any xenctrl reference from xenstored code. Please note that the last patch can be committed only after the related Mini-OS patch "config: add support for libxenmanage" has gone in AND the Mini-OS commit-id has been updated in Config.mk accordingly! Juergen Gross (6):

[PATCH 1/6] xen: add a domain unique id to each domain

2024-10-23 Thread Juergen Gross
igned-off-by: Juergen Gross Reviewed-by: Jan Beulich --- V1: - make unique_id local to function (Jan Beulich) - add lock (Julien Grall) - add comment (Julien Grall) --- xen/common/domain.c | 20 xen/include/xen/sched.h | 3 +++ 2 files changed, 23 insertions(+) diff --

[PATCH 5/6] tools: add a dedicated header file for barrier definitions

2024-10-23 Thread Juergen Gross
Instead of having to include xenctrl.h for getting definitions of cpu barriers, add a dedicated header for that purpose. Switch the xen-9pfsd daemon to use the new header instead of xenctrl.h. This is in preparation of making Xenstore independent from libxenctrl. Signed-off-by: Juergen Gross

[PATCH 3/6] xen: add new domctl get_changed_domain

2024-10-23 Thread Juergen Gross
version, but might be lower in case the hypervisor doesn't support this version). Signed-off-by: Juergen Gross --- V1: - use a domctl subop for the new interface (Jan Beulich) --- tools/flask/policy/modules/dom0.te | 2 +- xen/common/domain.c

[GIT PULL] xen: branch for v6.12-rc4

2024-10-20 Thread Juergen Gross
Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-6.12a-rc4-tag xen: branch for v6.12-rc4 It contains just a single fix for a build failure introduced with a patch in the 6.12 merge window. Thanks. Juergen drivers/xen/Kconfig

[PATCH] xen/public: add comments regarding interface version bumps

2024-10-14 Thread Juergen Gross
domctl.h and sysctl.h have an interface version, which needs to be bumped in case of incompatible modifications of the interface. In order to avoid misunderstandings, add a comment to both headers specifying in which cases a bump is needed. Signed-off-by: Juergen Gross --- xen/include/public

[PATCH] xen/public: increment domctl interface version

2024-10-14 Thread Juergen Gross
ned-off-by: Juergen Gross --- xen/include/public/domctl.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h index e1028fc524..54cc9a06db 100644 --- a/xen/include/public/domctl.h +++ b/xen/include/public/domctl.h @@ -

[GIT PULL] xen: branch for v6.12-rc3

2024-10-11 Thread Juergen Gross
, 4 insertions(+) Juergen Gross (1): x86/xen: mark boot CPU of PV guest in MSR_IA32_APICBASE

Re: [PATCH v3] xen: Remove dependency between pciback and privcmd

2024-10-11 Thread Juergen Gross
On 11.10.24 05:42, Jiqian Chen wrote: Commit 2fae6bb7be32 ("xen/privcmd: Add new syscall to get gsi from dev") adds a weak reverse dependency to the config XEN_PRIVCMD definition, that dependency causes xen-privcmd can't be loaded on domU, because dependent xen-pciback isn't always be loaded succ

Re: [PATCH v3] xen: Remove dependency between pciback and privcmd

2024-10-11 Thread Juergen Gross
b7be32 ("xen/privcmd: Add new syscall to get gsi from dev") Reported-by: Marek Marczykowski-Górecki Signed-off-by: Jiqian Chen Reviewed-by: Juergen Gross Juergen OpenPGP_0xB0DE9DD628BF132F.asc Description: OpenPGP public key OpenPGP_signature.asc Description: OpenPGP digital signature

Re: [PATCH v3] xen: Remove dependency between pciback and privcmd

2024-10-11 Thread Juergen Gross
On 11.10.24 12:10, Jan Beulich wrote: On 11.10.2024 11:33, Chen, Jiqian wrote: On 2024/10/11 17:20, Chen, Jiqian wrote: On 2024/10/11 16:54, Jan Beulich wrote: On 11.10.2024 05:42, Jiqian Chen wrote: @@ -1757,11 +1756,19 @@ static int __init xen_pcibk_init(void) bus_register_n

  1   2   3   4   5   6   7   8   9   10   >