Re: [Xen-devel] [RFC] xen: Add .astylerc for automated style-formatting

2019-07-26 Thread Julien Grall
On 26/07/2019 16:48, Viktor Mitin wrote: Hi All, On Thu, Jul 18, 2019 at 5:45 PM Tamas K Lengyel wrote: Checking the comment styles are not included in the automation. The same about clang-format. Checking the comment styles is not supported. It seems this is not code format checker task

Re: [Xen-devel] [PATCH v3 33/35] OvmfPkg: Introduce XenIoPvhDxe to initialize Grant Tables

2019-07-26 Thread Anthony PERARD
On Wed, Jul 10, 2019 at 04:05:02PM +0200, Laszlo Ersek wrote: > On 07/04/19 16:42, Anthony PERARD wrote: > > + > > +STATIC > > +VOID > > +EFIAPI > > +XenIoPvhDxeNotifyExitBoot ( > > + IN EFI_EVENT Event, > > + IN VOID *Context > > + ) > > +{ > > + XEN_IO_PVH_STATE *State; > > + EFI_STAT

Re: [Xen-devel] [PATCH] tboot: remove maintainers and declare orphaned

2019-07-26 Thread Lars Kurth
> On 26 Jul 2019, at 08:17, Roger Pau Monné wrote: > > On Thu, Jul 25, 2019 at 03:08:07PM -0400, Rich Persaud wrote: >> (cc Intel and tboot-devel) >> >> Hi Roger, >> >> Thanks for your interest in documenting the status of maintenance for Intel >> TXT support in Xen. Intel TXT and Xen are d

Re: [Xen-devel] [PATCH V3] tools/libxl: Add iothread support for COLO

2019-07-26 Thread Anthony PERARD
On Fri, Jul 26, 2019 at 11:43:40PM +0800, Zhang Chen wrote: > From: Zhang Chen > > Xen COLO and KVM COLO shared lots of code in Qemu. > The colo-compare object in Qemu now requires an 'iothread' property since > QEMU 2.11. > > Detail: > https://wiki.qemu.org/Features/COLO > > Signed-off-by: Zh

[Xen-devel] [PATCH V4] tools/libxl: Add iothread support for COLO

2019-07-26 Thread Zhang Chen
From: Zhang Chen Xen COLO and KVM COLO shared lots of code in Qemu. The colo-compare object in Qemu now requires an 'iothread' property since QEMU 2.11. Detail: https://wiki.qemu.org/Features/COLO Signed-off-by: Zhang Chen Reviewed-by: Anthony PERARD --- tools/libxl/libxl_dm.c | 4 +++- 1 f

Re: [Xen-devel] [PATCH 2/2] x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown

2019-07-26 Thread Julien Grall
Hi, On 26/07/2019 16:19, Roger Pau Monné wrote: On Fri, Jul 26, 2019 at 03:45:22PM +0100, Andrew Cooper wrote: On 26/07/2019 15:38, Roger Pau Monné wrote: On Fri, Jul 26, 2019 at 02:52:40PM +0100, Andrew Cooper wrote: There is no way to do this inside DEFINE_PER_CPU_PAGE_ALIGNED(), because we

[Xen-devel] [freebsd-master test] 139368: all pass - PUSHED

2019-07-26 Thread osstest service owner
flight 139368 freebsd-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/139368/ Perfect :-) All tests in this flight passed as required version targeted for testing: freebsd 467944ce4546b5d2cd88b15125501d03597920bd baseline version: freebsd d78b126a34d

Re: [Xen-devel] [PATCH 7/7] xen/arm: types: Specify the zero padding in the definition of PRIregister

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > On 23/07/2019 22:35, Julien Grall wrote: >> The definition of PRIregister varies between Arm32 and Arm64 (32-bit vs >> 64-bit). However, some of the users uses the wrong padding. >> >> For more consistency, the padding is now moved into the PRIregister and >> varies dependi

Re: [Xen-devel] [PATCH v3 33/35] OvmfPkg: Introduce XenIoPvhDxe to initialize Grant Tables

2019-07-26 Thread Laszlo Ersek
On 07/26/19 18:06, Anthony PERARD wrote: > On Wed, Jul 10, 2019 at 04:05:02PM +0200, Laszlo Ersek wrote: >> On 07/04/19 16:42, Anthony PERARD wrote: >>> + if (State == NULL) { >>> +Status = EFI_OUT_OF_RESOURCES; >>> +goto Error; >>> + } >>> + >>> + Allocation = AllocateReservedPages (XE

[Xen-devel] [linux-linus test] 139361: regressions - FAIL

2019-07-26 Thread osstest service owner
flight 139361 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/139361/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt 7 xen-boot fail REGR. vs. 133580 test-amd64-i386-xl-

Re: [Xen-devel] PVHv2/HVM memory layout and interface specification

2019-07-26 Thread Johnson, Ethan
On 2019-07-22 21:11:40 -0400, Andrew Cooper wrote: > On 23/07/2019 00:50, Johnson, Ethan wrote: > > (The Xen 4.7 version of the documentation had a little bit > > more detail at https://xenbits.xen.org/docs/4.7-testing/misc/pvh.html, but > > it still doesn't have quite what I'm looking for, and I'm

[Xen-devel] [xen-unstable-smoke test] 139380: tolerable all pass - PUSHED

2019-07-26 Thread osstest service owner
flight 139380 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/139380/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-armhf-armhf-xl 1

[Xen-devel] [PATCH v2 2/2] x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown

2019-07-26 Thread Andrew Cooper
The XPTI work restricted the visibility of most of memory, but missed a few aspects when it came to the TSS. Given that the TSS is just an object in percpu data, the 4k mapping for it created in setup_cpu_root_pgt() maps adjacent percpu data, making it all leakable via Meltdown, even when XPTI is

[Xen-devel] [PATCH v2 1/2] xen/link: Introduce .bss.percpu.page_aligned

2019-07-26 Thread Andrew Cooper
Future changes are going to need to page align some percpu data. This means that the percpu area needs suitably aligning in the BSS so CPU0 has correctly aligned data. Shuffle the exact link order of items within the BSS to give .bss.percpu.page_aligned appropriate alignment. In addition, we nee

[Xen-devel] [PATCH v2 0/2] x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown

2019-07-26 Thread Andrew Cooper
Reworked to allow DEFINE_PER_CPU_PAGE_ALIGNED() to specify the __aligned(PAGE_SIZE) itself. Andrew Cooper (2): xen/link: Introduce .bss.percpu.page_aligned x86/xpti: Don't leak TSS-adjacent percpu data via Meltdown xen/arch/arm/xen.lds.S | 5 +++-- xen/arch/x86/setup.c|

[Xen-devel] [xen-unstable test] 139364: regressions - FAIL

2019-07-26 Thread osstest service owner
flight 139364 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/139364/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-examine11 examine-serial/bootloader fail REGR. vs. 139342 Tests which did no

[Xen-devel] [PATCH 1/4] arm/percpu: Move {get, set}_processor_id() into smp.h

2019-07-26 Thread Andrew Cooper
For cleanup purposes, it is necessary for asm/percpu.h to not use DECLARE_PER_CPU() itself. asm/smp.h is arguably a better place for it to live anyway. Signed-off-by: Andrew Cooper --- CC: Stefano Stabellini CC: Julien Grall CC: Volodymyr Babchuk --- xen/include/asm-arm/percpu.h | 6 --

[Xen-devel] [PATCH 4/4] xen/percpu: Make DECLARE_PER_CPU() and __DEFINE_PER_CPU() common

2019-07-26 Thread Andrew Cooper
These macros are identical across the architectures, and shouldn't be separate from the DEFINE_PER_CPU*() infrastructure. This converts the final asm/percpu.h includes, which were all using DECLARE_PER_CPU(), to include xen/percpu.h instead. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC:

[Xen-devel] [PATCH 2/4] xen/percpu: Drop unused xen/percpu.h includes

2019-07-26 Thread Andrew Cooper
None of these headers use any PER_CPU() infrastructure. xen/rwlock.h however does, and picked it up transitively via xen/spinlock.h, so include it properly. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Wei Liu CC: Roger Pau Monné CC: Stefano Stabellini CC: Julien Grall CC: Volodymyr

[Xen-devel] [PATCH 0/4] xen/percpu: Cleanup

2019-07-26 Thread Andrew Cooper
This is all cleanup which I got tangled in as part of the TSS xpti v2 fix, before deciding that this is far too invasive to backport, whereas the TSS fix itself really does want backporting. This series is based on: https://lore.kernel.org/xen-devel/20190726203222.4833-1-andrew.coop...@citrix.c

[Xen-devel] [PATCH 3/4] xen/percpu: Drop unused asm/percpu.h includes

2019-07-26 Thread Andrew Cooper
These files either don't use any PER_CPU() infrastructure at all, or use DEFINE_PER_CPU_*(). This is declared in xen/percpu.h, not asm/percpu.h, which means that xen/percpu.h is included via a different path. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Wei Liu CC: Roger Pau Monné CC:

Re: [Xen-devel] [PATCH v2 1/2] xen/link: Introduce .bss.percpu.page_aligned

2019-07-26 Thread Julien Grall
Hi Andrew, On 7/26/19 9:32 PM, Andrew Cooper wrote: Future changes are going to need to page align some percpu data. This means that the percpu area needs suitably aligning in the BSS so CPU0 has correctly aligned data. Shuffle the exact link order of items within the BSS to give .bss.percpu.p

[Xen-devel] [PATCH] tools: ipxe: update for fixing build with GCC9

2019-07-26 Thread Dario Faggioli
Building with GCC9 (on openSUSE Tubmleweed) generates a lot of errors of the "taking address of packed member of ... may result in an unaligned pointer value" kind. Updating to upstream commit 1dd56dbd11082 ("[build] Workaround compilation error with gcc 9.1") seems to fix the problem. For more i

Re: [Xen-devel] [PATCH 1/4] arm/percpu: Move {get, set}_processor_id() into smp.h

2019-07-26 Thread Julien Grall
Hi Andrew, Thank you for looking into this. On 7/26/19 10:08 PM, Andrew Cooper wrote: > For cleanup purposes, it is necessary for asm/percpu.h to not use > DECLARE_PER_CPU() itself. asm/smp.h is arguably a better place for it to > live anyway. I have noticed that a lot of arch helpers called by

Re: [Xen-devel] [PATCH 3/4] xen/percpu: Drop unused asm/percpu.h includes

2019-07-26 Thread Julien Grall
Hi Andrew, On 7/26/19 10:08 PM, Andrew Cooper wrote: These files either don't use any PER_CPU() infrastructure at all, or use DEFINE_PER_CPU_*(). This is declared in xen/percpu.h, not asm/percpu.h, which means that xen/percpu.h is included via a different path. Signed-off-by: Andrew Cooper

Re: [Xen-devel] [PATCH 4/4] xen/percpu: Make DECLARE_PER_CPU() and __DEFINE_PER_CPU() common

2019-07-26 Thread Julien Grall
Hi Andrew, On 7/26/19 10:08 PM, Andrew Cooper wrote: These macros are identical across the architectures, and shouldn't be separate from the DEFINE_PER_CPU*() infrastructure. This converts the final asm/percpu.h includes, which were all using DECLARE_PER_CPU(), to include xen/percpu.h instead.

Re: [Xen-devel] [PATCH 1/4] arm/percpu: Move {get, set}_processor_id() into smp.h

2019-07-26 Thread Andrew Cooper
On 26/07/2019 23:30, Julien Grall wrote: > Hi Andrew, > > Thank you for looking into this. > > On 7/26/19 10:08 PM, Andrew Cooper wrote: >> For cleanup purposes, it is necessary for asm/percpu.h to not use >> DECLARE_PER_CPU() itself. asm/smp.h is arguably a better place for it to >> live anyway.

[Xen-devel] [xen-4.12-testing test] 139366: regressions - FAIL

2019-07-26 Thread osstest service owner
flight 139366 xen-4.12-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/139366/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-credit2 7 xen-boot fail REGR. vs. 139177 test-amd64-amd

[Xen-devel] [ovmf test] 139371: all pass - PUSHED

2019-07-26 Thread osstest service owner
flight 139371 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/139371/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf d47b85a621add591212546b12945d7b9873fbabf baseline version: ovmf 520a1e60de4341f55c59c

[Xen-devel] [linux-next test] 139367: regressions - FAIL

2019-07-26 Thread osstest service owner
flight 139367 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/139367/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-libvirt-xsm 16 guest-start/debian.repeat fail REGR. vs. 139338 Tests which did not

[Xen-devel] Assign dedicated CPU to domain

2019-07-26 Thread Raushan Kumar
Hi team, I am beginner for XEN platform and curious to know how to assign specific CPU to dom0 and domU? Could you please provide me any relevant link for same? I have two CPU ARCH Cortex -A57 and Cortex A-53 and I want to assign dom0 to Cortex -A57 and cross check that Is it assign to same or

Re: [Xen-devel] [PATCH] tboot: remove maintainers and declare orphaned

2019-07-26 Thread Roger Pau Monné
On Thu, Jul 25, 2019 at 03:08:07PM -0400, Rich Persaud wrote: > (cc Intel and tboot-devel) > > Hi Roger, > > Thanks for your interest in documenting the status of maintenance for Intel > TXT support in Xen. Intel TXT and Xen are deployed in production today by > OpenXT and QubesOS for boot int

Re: [Xen-devel] [PATCH v3 4/9] x86/mm/tlb: Flush remote and local TLBs concurrently

2019-07-26 Thread Juergen Gross
On 19.07.19 02:58, Nadav Amit wrote: To improve TLB shootdown performance, flush the remote and local TLBs concurrently. Introduce flush_tlb_multi() that does so. Introduce paravirtual versions of flush_tlb_multi() for KVM, Xen and hyper-v (Xen and hyper-v are only compile-tested). While the upd

Re: [Xen-devel] [PATCH v3 1/2] x86/ubsan: Don't perform alignment checking on supporting compilers

2019-07-26 Thread Jan Beulich
>>> On 27.06.19 at 20:56, wrote: > GCC 5 introduced -fsanitize=alignment which is enabled by default by > CONFIG_UBSAN. This trips a load of wont-fix cases in the ACPI tables and the > hypercall page and stubs writing logic. > > It also causes the native Xen boot to crash before the console is s

[Xen-devel] [xen-unstable test] 139342: tolerable FAIL - PUSHED

2019-07-26 Thread osstest service owner
flight 139342 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/139342/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stopfail like 139259 test-amd64-i386-xl-qemuu-win7-amd64

Re: [Xen-devel] Assign dedicated CPU to domain

2019-07-26 Thread Andrii Anisov
Hello Kumar, On 26.07.19 09:26, Raushan Kumar wrote: Could you please provide me any relevant link for same? I have two CPU ARCH Cortex –A57 and Cortex A-53  and I want to assign dom0 to Cortex –A57 and cross check that Is it assign to same or not? As long as you have big.LITTLE on your site

Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx

2019-07-26 Thread Jan Beulich
On 23.07.2019 20:25, Roman Shaposhnik wrote: > Interestingly enough, adding iommu_inclusive_mapping=1 AND iommu=debug > booted the system just fine. Btw (I've noticed this only now) - are you saying without "iommu=debug" the box does _not_ boot fine, despite the other option? Jan

Re: [Xen-devel] [PATCH] tboot: remove maintainers and declare orphaned

2019-07-26 Thread Jan Beulich
On 25.07.2019 21:08, Rich Persaud wrote: > Since we have at least one Intel maintainer, Lukasz, the feature need not be > orphaned. If Shawn is not responding to the request to confirm Lukasz as > maintainer, the Xen community has multiple communication channels with Intel. > Pragmatically, a revi

[Xen-devel] [PATCH] xen/arm: extend fdt_property_interrupts

2019-07-26 Thread Viktor Mitin
xen/arm: extend fdt_property_interrupts to deal with other domain than the hwdom Tested with aarch64 qemu dom0 and dom0less boot. Suggested-by: Julien Grall Signed-off-by: Viktor Mitin --- See discussion in mail: [PATCH] xen/arm: merge make_timer_node and make_timer_domU_node xen/arch/arm/d

Re: [Xen-devel] [PATCH] tests/cpu-policy: fix format-overflow warning by null terminating strings

2019-07-26 Thread Andrew Cooper
On 25/07/2019 11:03, Jan Beulich wrote: > On 25.07.2019 02:53, christopher.w.cl...@gmail.com wrote: >> gcc 9.1.0 reports: >> >> | test-cpu-policy.c:64:18: error: '%.12s' directive argument is not a >> nul-terminated string [-Werror=format-overflow=] >> |64 | fail(" Test '%.12s', e

Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx

2019-07-26 Thread Roger Pau Monné
On Thu, Jul 25, 2019 at 05:47:19PM -0700, Roman Shaposhnik wrote: > Hi Roger! > > With your patch (and build as a debug build) Xen crashes on boot > (which I guess was the point of your BUG_ON statement). Yes, that's very weird, seems like entries are not added to the iommu page tables but I have

Re: [Xen-devel] [PATCH] tests/cpu-policy: fix format-overflow warning by null terminating strings

2019-07-26 Thread Dario Faggioli
On Thu, 2019-07-25 at 10:25 +0200, Roger Pau Monné wrote: > On Wed, Jul 24, 2019 at 05:53:26PM -0700, > christopher.w.cl...@gmail.com wrote: > > From: Christopher Clark > > > > diff --git a/tools/tests/cpu-policy/test-cpu-policy.c > > b/tools/tests/cpu-policy/test-cpu-policy.c > > index ca3b8dd4

Re: [Xen-devel] [PATCH v3 2/2] xen: merge temporary vcpu pinning scenarios

2019-07-26 Thread Andrew Cooper
On 24/07/2019 12:26, Juergen Gross wrote: > diff --git a/xen/common/wait.c b/xen/common/wait.c > index 4f830a14e8..3fc5f68611 100644 > --- a/xen/common/wait.c > +++ b/xen/common/wait.c > @@ -34,8 +34,6 @@ struct waitqueue_vcpu { > */ > void *esp; > char *stack; > -cpumask_t save

Re: [Xen-devel] [PATCH v3 2/2] xen: merge temporary vcpu pinning scenarios

2019-07-26 Thread Juergen Gross
On 26.07.19 11:46, Andrew Cooper wrote: On 24/07/2019 12:26, Juergen Gross wrote: diff --git a/xen/common/wait.c b/xen/common/wait.c index 4f830a14e8..3fc5f68611 100644 --- a/xen/common/wait.c +++ b/xen/common/wait.c @@ -34,8 +34,6 @@ struct waitqueue_vcpu { */ void *esp; char

[Xen-devel] [PATCH] ci: install C++ in opensuse-leap CI container

2019-07-26 Thread Dario Faggioli
The openSUSE Leap container image, built after opensuse-leap.dockerfile was missing the gcc-c++, which is necessary, e.g., for building OVMF. Add it. Signed-off-by: Dario Faggioli --- Cc: Doug Goldstein --- automation/build/suse/opensuse-leap.dockerfile |1 + 1 file changed, 1 insertion(+)

Re: [Xen-devel] Failing to build qemu-xen (in dev-mtp.c) with GCC9

2019-07-26 Thread Anthony PERARD
On Fri, Jul 26, 2019 at 02:24:23AM +0200, Dario Faggioli wrote: > Hey, Hi, > openSUSE Tumbleweed has: gcc version 9.1.1 20190703 > > And this fails to build QEMU, like this: I'm sorry I have to ask, which version of QEMU or qemu-xen are speaking about? I'm pretty sure it's unstable, but it's be

[Xen-devel] [PATCH RFC] x86/shim: Refresh pvshim_defconfig

2019-07-26 Thread Andrew Cooper
* Add a dependency so the shim gets rebuilt when pvshim_defconfig changes. * Default to the NULL scheduler now that it works with vcpu online/offline. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Wei Liu CC: Roger Pau Monné CC: Juergen Gross CC: Dario Faggioli This patch depends on

Re: [Xen-devel] [PATCH v3 2/2] xen: merge temporary vcpu pinning scenarios

2019-07-26 Thread Andrew Cooper
On 26/07/2019 10:53, Juergen Gross wrote: > On 26.07.19 11:46, Andrew Cooper wrote: >> On 24/07/2019 12:26, Juergen Gross wrote: >>> diff --git a/xen/common/wait.c b/xen/common/wait.c >>> index 4f830a14e8..3fc5f68611 100644 >>> --- a/xen/common/wait.c >>> +++ b/xen/common/wait.c >>> @@ -34,8 +34,6

Re: [Xen-devel] [PATCH v3 2/2] xen: merge temporary vcpu pinning scenarios

2019-07-26 Thread Juergen Gross
On 26.07.19 12:13, Andrew Cooper wrote: On 26/07/2019 10:53, Juergen Gross wrote: On 26.07.19 11:46, Andrew Cooper wrote: On 24/07/2019 12:26, Juergen Gross wrote: diff --git a/xen/common/wait.c b/xen/common/wait.c index 4f830a14e8..3fc5f68611 100644 --- a/xen/common/wait.c +++ b/xen/common/wa

[Xen-devel] [RFC 0/6] XEN scheduling hardening

2019-07-26 Thread Andrii Anisov
From: Andrii Anisov This is the very RFC series, which is aimed to address some of VCPU time accounting problems which affect scheduling fairness and accuracy. Please note that this is done for ARM64 yet. One of the scheduling problems is a misleading CPU idle time concept. Now for the CPU idle

[Xen-devel] [RFC 1/6] xen/arm: Re-enable interrupt later in the trap path

2019-07-26 Thread Andrii Anisov
From: Julien Grall This makes function enter_hypervisor_head() being executed with irqs locked. Signed-off-by: Julien Grall [Andrii: add a justification commit message] Signed-off-by: Andrii Anisov --- xen/arch/arm/arm64/entry.S | 11 +-- xen/arch/arm/traps.c | 6 ++ 2 file

[Xen-devel] [RFC 3/6] sysctl: extend XEN_SYSCTL_getcpuinfo interface

2019-07-26 Thread Andrii Anisov
From: Andrii Anisov Extend XEN_SYSCTL_getcpuinfo interface with guest and hypervisor time information. Signed-off-by: Andrii Anisov --- xen/common/schedule.c | 22 ++ xen/common/sysctl.c | 2 ++ xen/include/public/sysctl.h | 2 ++ xen/include/xen/sched.h

[Xen-devel] [RFC 2/6] schedule: account true system idle time

2019-07-26 Thread Andrii Anisov
From: Andrii Anisov Currently the idle time is being accounted as a idle vcpu runtime. This is not entirely correct, because the entity named idle vcpu is in fact a hypervisor tasks worker. E.g. some softirqs are processed by the idle vcpu. So lets change idle vcpu time accounting and specify sys

[Xen-devel] [RFC 5/6] arm64: сall enter_hypervisor_head only when it is needed

2019-07-26 Thread Andrii Anisov
From: Andrii Anisov On ARM64 we know exactly if trap happened from hypervisor or guest, so we do not need to take that decision. This reduces a condition for all enter_hypervisor_head calls and the function call for traps from the hypervisor mode. Currently, it is implemented for ARM64 only. Int

[Xen-devel] [RFC 6/6] schedule: account all the hypervisor time to the idle vcpu

2019-07-26 Thread Andrii Anisov
From: Andrii Anisov Account for a guest: - guest running time - guest sync traps serving time (hypercalls, trapped emulated iomems, etc) - vcpu jobs in leave_hypervisor_tail Account for the hyp: - IRQ processing - Softirq processing Signed-off-by: Andrii Anisov --- xen/arch/arm/traps.c

[Xen-devel] [RFC 5/6] arm64: call enter_hypervisor_head only when it is needed

2019-07-26 Thread Andrii Anisov
From: Andrii Anisov On ARM64 we know exactly if trap happened from hypervisor or guest, so we do not need to take that decision. This reduces a condition for all enter_hypervisor_head calls and the function call for traps from the hypervisor mode. Currently, it is implemented for ARM64 only. Int

[Xen-devel] [RFC 4/6] xentop: show CPU load information

2019-07-26 Thread Andrii Anisov
From: Andrii Anisov Let xentop request and show information about CPU load (hypervisor, guest and idle information) Signed-off-by: Andrii Anisov --- tools/xenstat/libxenstat/src/xenstat.c | 38 + tools/xenstat/libxenstat/src/xenstat.h | 9 +++ tools/x

[Xen-devel] [linux-4.19 test] 139348: regressions - FAIL

2019-07-26 Thread osstest service owner
flight 139348 linux-4.19 real [real] http://logs.test-lab.xenproject.org/osstest/logs/139348/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvops 6 kernel-build fail REGR. vs. 129313 Tests which are fail

Re: [Xen-devel] [RFC 5/6] arm64: сall enter_hypervisor_head only when it is needed

2019-07-26 Thread Andrii Anisov
Sorry guys, I was eliminating cyrillic "с" in the commit title and occasionally left this patch in the folder. Please ignore exactly this patch. -- Sincerely, Andrii Anisov. ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenp

Re: [Xen-devel] [RFC 1/6] xen/arm: Re-enable interrupt later in the trap path

2019-07-26 Thread Julien Grall
Hi, On 26/07/2019 11:37, Andrii Anisov wrote: From: Julien Grall This makes function enter_hypervisor_head() being executed with irqs locked. This is the 3rd time you send this patch... and still no proper explanation why this is done nor the impact on keeping the interrupts disabled longer

[Xen-devel] [ovmf test] 139357: all pass - PUSHED

2019-07-26 Thread osstest service owner
flight 139357 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/139357/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 520a1e60de4341f55c59cf4680d6d0242a7f929f baseline version: ovmf 0dd8d7d556df46c503254

Re: [Xen-devel] [PATCH RFC] x86/shim: Refresh pvshim_defconfig

2019-07-26 Thread Juergen Gross
On 26.07.19 12:10, Andrew Cooper wrote: * Add a dependency so the shim gets rebuilt when pvshim_defconfig changes. * Default to the NULL scheduler now that it works with vcpu online/offline. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Wei Liu CC: Roger Pau Monné CC: Juergen Gross C

Re: [Xen-devel] [RFC 5/6] arm64: call enter_hypervisor_head only when it is needed

2019-07-26 Thread Julien Grall
Hi, On 26/07/2019 11:37, Andrii Anisov wrote: From: Andrii Anisov On ARM64 we know exactly if trap happened from hypervisor or guest, so we do not need to take that decision. This reduces a condition for all enter_hypervisor_head calls and the function call for traps from the hypervisor mode.

Re: [Xen-devel] Assign dedicated CPU to domain

2019-07-26 Thread Raushan Kumar
Hi team, Thank you for quick response. However, this explanation is not for my question. I want to assign dom0 to Cortex A-57 and my machine has 3-4 CPU of ARM architecture , Could you please aware me what is the procedure ? I already gone through the your wiki, but do not get relevant answer.

[Xen-devel] [xen-unstable-smoke test] 139365: tolerable all pass - PUSHED

2019-07-26 Thread osstest service owner
flight 139365 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/139365/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [Xen-devel] [PATCH v3 2/2] xen: merge temporary vcpu pinning scenarios

2019-07-26 Thread Jan Beulich
On 26.07.2019 11:46, Andrew Cooper wrote: > On 24/07/2019 12:26, Juergen Gross wrote: >> @@ -182,30 +178,24 @@ static void __prepare_to_wait(struct waitqueue_vcpu >> *wqv) >> static void __finish_wait(struct waitqueue_vcpu *wqv) >> { >> wqv->esp = NULL; >> -(void)vcpu_set_hard_affini

Re: [Xen-devel] [PATCH v3 2/2] xen: merge temporary vcpu pinning scenarios

2019-07-26 Thread Juergen Gross
On 26.07.19 13:35, Jan Beulich wrote: On 26.07.2019 11:46, Andrew Cooper wrote: On 24/07/2019 12:26, Juergen Gross wrote: @@ -182,30 +178,24 @@ static void __prepare_to_wait(struct waitqueue_vcpu *wqv) static void __finish_wait(struct waitqueue_vcpu *wqv) { wqv->esp = NULL; -(v

Re: [Xen-devel] [PATCH v3 2/2] xen: merge temporary vcpu pinning scenarios

2019-07-26 Thread Andrew Cooper
On 26/07/2019 12:42, Juergen Gross wrote: > On 26.07.19 13:35, Jan Beulich wrote: >> On 26.07.2019 11:46, Andrew Cooper wrote: >>> On 24/07/2019 12:26, Juergen Gross wrote: @@ -182,30 +178,24 @@ static void __prepare_to_wait(struct waitqueue_vcpu *wqv)    static void __finish_wait(st

Re: [Xen-devel] [RFC 0/6] XEN scheduling hardening

2019-07-26 Thread Dario Faggioli
[Adding George plus others x86, ARM and core-Xen people] Hi Andrii, First of all, thanks a lot for this series! The problem you mention is a long standing one, and I'm glad we're eventually starting to properly look into it. I already have one comment: I think I can see from where this come fro

Re: [Xen-devel] [PATCH] xen/arm: extend fdt_property_interrupts

2019-07-26 Thread Volodymyr Babchuk
Hello Vikor, Viktor Mitin writes: > xen/arm: extend fdt_property_interrupts to deal with other > domain than the hwdom It is unclear what problem you are facing. Could you please elaborate commit message? Also, looks like your commit message is formatted incorrectly. > Tested with aarch64 qem

Re: [Xen-devel] [RFC 2/6] schedule: account true system idle time

2019-07-26 Thread Dario Faggioli
On Fri, 2019-07-26 at 13:37 +0300, Andrii Anisov wrote: > From: Andrii Anisov > > Currently the idle time is being accounted as a idle vcpu runtime. > This is not entirely correct, because the entity named idle vcpu is > in fact a hypervisor tasks worker. E.g. some softirqs are processed > by the

Re: [Xen-devel] [PATCH 1/7] xen/public: arch-arm: Restrict the visibility of struct vcpu_guest_core_regs

2019-07-26 Thread Volodymyr Babchuk
Hi Julien, Julien Grall writes: > Currently, the structure vcpu_guest_core_regs is part of the public API. > This implies that any change in the structure should be backward > compatible. > > However, the structure is only needed by the tools and Xen. It is also > not expected to be ever used ou

Re: [Xen-devel] [RFC 0/6] XEN scheduling hardening

2019-07-26 Thread Juergen Gross
On 26.07.19 13:56, Dario Faggioli wrote: [Adding George plus others x86, ARM and core-Xen people] Hi Andrii, First of all, thanks a lot for this series! The problem you mention is a long standing one, and I'm glad we're eventually starting to properly look into it. I already have one comment:

Re: [Xen-devel] [RFC 3/6] sysctl: extend XEN_SYSCTL_getcpuinfo interface

2019-07-26 Thread Dario Faggioli
On Fri, 2019-07-26 at 13:37 +0300, Andrii Anisov wrote: > diff --git a/xen/common/schedule.c b/xen/common/schedule.c > index 0a38d4a..9e8805d 100644 > --- a/xen/common/schedule.c > +++ b/xen/common/schedule.c > @@ -217,6 +217,28 @@ uint64_t get_cpu_idle_time(unsigned int cpu) > return state.ti

Re: [Xen-devel] [PATCH 2/7] xen/arm: SCTLR_EL1 is a 64-bit register on Arm64

2019-07-26 Thread Volodymyr Babchuk
Hi, Julien Grall writes: > On Arm64, system registers are always 64-bit including SCTLR_EL1. > However, Xen is assuming this is 32-bit because earlier revision of > Armv8 had the top 32-bit RES0 (see ARM DDI0595.b). > > From Armv8.5, some bits in [63:32] will be defined and allowed to be > modif

[Xen-devel] Xen Coding style and clang-format

2019-07-26 Thread Viktor Mitin
Hi All, The Xen Project has a coding standard in place, but like many projects, the standard is only enforced through peer review. Such mistakes slip through and code is imported from other projects which may not follow the same standard. The goal would be to come up with a tool that can audit the

Re: [Xen-devel] [PATCH 4/7] xen/arm: traps: Avoid using BUG_ON() in _show_registers()

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > At the moment, _show_registers() is using a BUG_ON() to assert only > userspace will run 32-bit code in a 64-bit domain. > > Such extra precaution is not necessary and could be avoided by only > checking the CPU mode to decide whether show_registers_64() or > show_reigsters

[Xen-devel] [qemu-mainline test] 139352: regressions - FAIL

2019-07-26 Thread osstest service owner
flight 139352 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/139352/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 12 guest-start/debianhvm.repeat fail REGR.

Re: [Xen-devel] Xen Coding style and clang-format

2019-07-26 Thread Lars Kurth
> On 26 Jul 2019, at 13:30, Viktor Mitin wrote: > > Hi All, > > The Xen Project has a coding standard in place, but like many > projects, the standard is only enforced through peer review. Such > mistakes slip through and code is imported from other projects which > may not follow the same sta

Re: [Xen-devel] [PATCH 3/7] xen/arm: Rework psr_mode_is_32bit()

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > psr_mode_is_32bit() prototype does not match the rest of the helpers for > the process state. Looking at the callers, most of them will access > struct cpu_user_regs just for calling psr_mode_is_32bit(). > > The macro is now reworked to take a struct cpu_user_regs in parame

[Xen-devel] per-domain passthrough/iommu options

2019-07-26 Thread Paul Durrant
Hi, I sent a previous email [1] about enabling use of the IOMMU on a per-domain basis and am now a reasonable way into my patch series, which also allows for IOMMU option-setting (specifically shared EPT use) on a per-domain basis too. Before I post v1 I'd like to get some opinion on the what

Re: [Xen-devel] [RFC 2/6] schedule: account true system idle time

2019-07-26 Thread Andrii Anisov
Hello Dario, On 26.07.19 15:00, Dario Faggioli wrote: On Fri, 2019-07-26 at 13:37 +0300, Andrii Anisov wrote: From: Andrii Anisov Currently the idle time is being accounted as a idle vcpu runtime. This is not entirely correct, because the entity named idle vcpu is in fact a hypervisor tasks w

Re: [Xen-devel] [PATCH 5/7] xen/arm: traps: Avoid BUG_ON() in do_trap_brk()

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > At the moment, do_trap_brk() is using a BUG_ON() to check the hardware > has been correctly configured during boot. > > Any error when configuring the hardware could result to a guest 'brk' > trapping in the hypervisor and crash it. > > This is pretty harsh to kill Xen when

Re: [Xen-devel] [PATCH 6/7] xen/arm: vsmc: The function identifier is always 32-bit

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > On Arm64, the SMCCC function identifier is always stored in the first 32-bit > of x0 register. The rest of the bits are not defined and should be > ignored. > > This means the variable funcid should be an uint32_t rather than > register_t. > > Signed-off-by: Julien Grall R

Re: [Xen-devel] [PATCH] xen/arm: extend fdt_property_interrupts

2019-07-26 Thread Viktor Mitin
Hi Volodymyr, On Fri, Jul 26, 2019 at 2:57 PM Volodymyr Babchuk wrote: > > > Hello Vikor, > > Viktor Mitin writes: > > > xen/arm: extend fdt_property_interrupts to deal with other > > domain than the hwdom > > It is unclear what problem you are facing. Could you please elaborate > commit message?

Re: [Xen-devel] [PATCH 7/7] xen/arm: types: Specify the zero padding in the definition of PRIregister

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > The definition of PRIregister varies between Arm32 and Arm64 (32-bit vs > 64-bit). However, some of the users uses the wrong padding. type: "users use" > For more consistency, the padding is now moved into the PRIregister and > varies depending on the architecture. I'm not

Re: [Xen-devel] Xen Coding style and clang-format

2019-07-26 Thread Julien Grall
On 26/07/2019 13:42, Lars Kurth wrote: Hi Viktor, Hi, thank you for putting this mail together and driving this forward. I added committers@ as well as Doug. I am going to let others respond first. I am assuming we are looking for some testing? I have already done some testings a couple

Re: [Xen-devel] [PATCH 1/7] xen/public: arch-arm: Restrict the visibility of struct vcpu_guest_core_regs

2019-07-26 Thread Julien Grall
On 26/07/2019 13:14, Volodymyr Babchuk wrote: Hi Julien, Hi Volodymyr, Julien Grall writes: Currently, the structure vcpu_guest_core_regs is part of the public API. This implies that any change in the structure should be backward compatible. However, the structure is only needed by the to

Re: [Xen-devel] [PATCH RFC] x86/shim: Refresh pvshim_defconfig

2019-07-26 Thread Tamas K Lengyel
On Fri, Jul 26, 2019 at 4:11 AM Andrew Cooper wrote: > > * Add a dependency so the shim gets rebuilt when pvshim_defconfig changes. > * Default to the NULL scheduler now that it works with vcpu online/offline. > > Signed-off-by: Andrew Cooper > --- > CC: Jan Beulich > CC: Wei Liu > CC: Roger Pa

Re: [Xen-devel] [PATCH RFC] x86/shim: Refresh pvshim_defconfig

2019-07-26 Thread Andrew Cooper
On 26/07/2019 13:55, Tamas K Lengyel wrote: > On Fri, Jul 26, 2019 at 4:11 AM Andrew Cooper > wrote: >> * Add a dependency so the shim gets rebuilt when pvshim_defconfig changes. >> * Default to the NULL scheduler now that it works with vcpu online/offline. >> >> Signed-off-by: Andrew Cooper >>

Re: [Xen-devel] per-domain passthrough/iommu options

2019-07-26 Thread Jan Beulich
On 26.07.2019 14:29, Paul Durrant wrote: >I sent a previous email [1] about enabling use of the IOMMU on a > per-domain basis and am now a reasonable way into my patch series, which also > allows for IOMMU option-setting (specifically shared EPT use) on a per-domain > basis too. Before I pos

Re: [Xen-devel] [RFC 3/6] sysctl: extend XEN_SYSCTL_getcpuinfo interface

2019-07-26 Thread Andrii Anisov
On 26.07.19 15:15, Dario Faggioli wrote: Yep, I think being able to know time spent running guests could be useful. Well, my intention was to see hypervisor run and true idle time. With this full series I see the distinct difference in xentop depending on the type of load in domains: On my

[Xen-devel] [libvirt test] 139358: regressions - FAIL

2019-07-26 Thread osstest service owner
flight 139358 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/139358/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt-pair 11 xen-boot/dst_host fail REGR. vs. 139303 test-arm64-arm64-libvir

Re: [Xen-devel] [PATCH 3/7] xen/arm: Rework psr_mode_is_32bit()

2019-07-26 Thread Julien Grall
Hi, On 26/07/2019 13:31, Volodymyr Babchuk wrote: Julien Grall writes: psr_mode_is_32bit() prototype does not match the rest of the helpers for the process state. Looking at the callers, most of them will access struct cpu_user_regs just for calling psr_mode_is_32bit(). The macro is now rewo

Re: [Xen-devel] [PATCH RFC] x86/shim: Refresh pvshim_defconfig

2019-07-26 Thread Tamas K Lengyel
On Fri, Jul 26, 2019 at 6:58 AM Andrew Cooper wrote: > > On 26/07/2019 13:55, Tamas K Lengyel wrote: > > On Fri, Jul 26, 2019 at 4:11 AM Andrew Cooper > > wrote: > >> * Add a dependency so the shim gets rebuilt when pvshim_defconfig changes. > >> * Default to the NULL scheduler now that it works

Re: [Xen-devel] [PATCH RFC] x86/shim: Refresh pvshim_defconfig

2019-07-26 Thread Andrew Cooper
On 26/07/2019 14:10, Tamas K Lengyel wrote: > On Fri, Jul 26, 2019 at 6:58 AM Andrew Cooper > wrote: >> On 26/07/2019 13:55, Tamas K Lengyel wrote: >>> On Fri, Jul 26, 2019 at 4:11 AM Andrew Cooper >>> wrote: * Add a dependency so the shim gets rebuilt when pvshim_defconfig changes. *

Re: [Xen-devel] [PATCH 1/7] xen/public: arch-arm: Restrict the visibility of struct vcpu_guest_core_regs

2019-07-26 Thread Volodymyr Babchuk
Julien Grall writes: > On 26/07/2019 13:14, Volodymyr Babchuk wrote: >> >> Hi Julien, > > Hi Volodymyr, > >> Julien Grall writes: >> >>> Currently, the structure vcpu_guest_core_regs is part of the public API. >>> This implies that any change in the structure should be backward >>> compatible. >>

Re: [Xen-devel] [PATCH 7/7] xen/arm: types: Specify the zero padding in the definition of PRIregister

2019-07-26 Thread Julien Grall
Hi, On 26/07/2019 13:47, Volodymyr Babchuk wrote: Julien Grall writes: The definition of PRIregister varies between Arm32 and Arm64 (32-bit vs 64-bit). However, some of the users uses the wrong padding. type: "users use" For more consistency, the padding is now moved into the PRIregister a

Re: [Xen-devel] [PATCH] xen/arm: extend fdt_property_interrupts

2019-07-26 Thread Volodymyr Babchuk
Viktor Mitin writes: > Hi Volodymyr, > > On Fri, Jul 26, 2019 at 2:57 PM Volodymyr Babchuk > wrote: >> >> >> Hello Vikor, >> >> Viktor Mitin writes: >> >> > xen/arm: extend fdt_property_interrupts to deal with other >> > domain than the hwdom >> >> It is unclear what problem you are facing. Coul

[Xen-devel] [PATCH 3/3] build: allow picking the env values for toolchain utilities

2019-07-26 Thread Roger Pau Monne
Don't force the usage of the hardcoded toolchain values if those are already set on the environment. Note that as part of the change the definition of AS and LD is moved after the setting of compiler related variables. Signed-off-by: Roger Pau Monné --- Cc: Andrew Cooper Cc: George Dunlap Cc:

  1   2   >