[PATCH] xen: arm: Spin-up cpu instead PSCI CPU OFF

2022-06-22 Thread dmitry . semenets
From: Dmytro Semenets Use spin-up cpu with disabled interrupts instead PSCI CPU OFF halt and reboot procedures. Some platforms can't stop CPU via PSCI because Thrusted OS can't migrate execution to other CPU. Signed-off-by: Dmytro Semenets --- xen/arch/arm/shutdown.c | 7 ++- 1 file change

Re: [PATCH] xen/console: do not drop serial output from the hardware domain

2022-06-22 Thread Jan Beulich
On 16.06.2022 13:31, Roger Pau Monné wrote: > On Tue, Jun 14, 2022 at 11:45:54AM +0200, Jan Beulich wrote: >> On 14.06.2022 11:38, Roger Pau Monné wrote: >>> On Tue, Jun 14, 2022 at 11:13:07AM +0200, Jan Beulich wrote: On 14.06.2022 10:32, Roger Pau Monné wrote: > On Tue, Jun 14, 2022 at 1

[qemu-mainline test] 171303: tolerable FAIL - PUSHED

2022-06-22 Thread osstest service owner
flight 171303 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/171303/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stopfail like 171301 test-armhf-armhf-libvirt 16 sav

Re: disabling mercurial repositories

2022-06-22 Thread George Dunlap
> On 21 Jun 2022, at 15:01, Andrew Cooper wrote: > > On 21/06/2022 14:48, Roger Pau Monné wrote: >> Hello, >> >> Last week we had a bit of an emergency when a web crawler started >> indexing all our mercurial repositories on xenbits, as caused the load >> on xenbits to go beyond what it can ha

Re: disabling mercurial repositories

2022-06-22 Thread Jan Beulich
On 21.06.2022 15:48, Roger Pau Monné wrote: > Last week we had a bit of an emergency when a web crawler started > indexing all our mercurial repositories on xenbits, as caused the load > on xenbits to go beyond what it can handle. > > As a temporary solution we decided to remove access to mercuria

Re: [PATCH v6 3/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests using legacy SSBD

2022-06-22 Thread Jan Beulich
On 17.06.2022 05:26, Henry Wang wrote: > It seems that this series [1] has been stale for more than a month and also > this series seems to be properly reviewed and acked already. > > From what Jan has replied to Roger and Andrew: > "... this addition the series would now look to be ready to go i

Re: disabling mercurial repositories

2022-06-22 Thread Andrew Cooper
On 22/06/2022 09:41, Jan Beulich wrote: > On 21.06.2022 15:48, Roger Pau Monné wrote: >> Last week we had a bit of an emergency when a web crawler started >> indexing all our mercurial repositories on xenbits, as caused the load >> on xenbits to go beyond what it can handle. >> >> As a temporary so

Re: [RFC PATCH 1/2] xen/memory : Add stats_table resource type

2022-06-22 Thread Jan Beulich
On 17.05.2022 16:33, Matias Ezequiel Vara Larsen wrote: > @@ -287,6 +288,10 @@ static inline void vcpu_runstate_change( > } > > v->runstate.state = new_state; > + > +// WIP: use a different interface > +runstate = (uint64_t*)v->stats.va; > +memcpy(runstate, &v->runstate.time

Re: [PATCH v3 3/3] xen: don't require virtio with grants for non-PV guests

2022-06-22 Thread Oleksandr
On 22.06.22 09:38, Juergen Gross wrote: Hello Juergen Commit fa1f57421e0b ("xen/virtio: Enable restricted memory access using Xen grant mappings") introduced a new requirement for using virtio devices: the backend now needs to support the VIRTIO_F_ACCESS_PLATFORM feature. This is an undue re

Re: [PATCH] xen/console: do not drop serial output from the hardware domain

2022-06-22 Thread Roger Pau Monné
On Wed, Jun 22, 2022 at 10:04:19AM +0200, Jan Beulich wrote: > On 16.06.2022 13:31, Roger Pau Monné wrote: > > On Tue, Jun 14, 2022 at 11:45:54AM +0200, Jan Beulich wrote: > >> On 14.06.2022 11:38, Roger Pau Monné wrote: > >>> On Tue, Jun 14, 2022 at 11:13:07AM +0200, Jan Beulich wrote: > On 1

Re: [PATCH v7 6/9] xen/arm: introduce CDF_staticmem

2022-06-22 Thread Jan Beulich
On 20.06.2022 04:44, Penny Zheng wrote: > --- a/xen/include/xen/domain.h > +++ b/xen/include/xen/domain.h > @@ -35,6 +35,18 @@ void arch_get_domain_info(const struct domain *d, > /* Should domain memory be directly mapped? */ > #define CDF_directmap(1U << 1) > #endif > +/* Is domain

Re: [PATCH v7 7/9] xen/arm: unpopulate memory when domain is static

2022-06-22 Thread Jan Beulich
On 20.06.2022 04:44, Penny Zheng wrote: > --- a/xen/common/page_alloc.c > +++ b/xen/common/page_alloc.c > @@ -2498,6 +2498,10 @@ void free_domheap_pages(struct page_info *pg, unsigned > int order) > } > > free_heap_pages(pg, order, scrub); > + > +/* Add page on the resv

Re: [PATCH v3] xen: Add MISRA support to cppcheck make rule

2022-06-22 Thread Bertrand Marquis
Hi Stefano, > On 22 Jun 2022, at 01:00, Stefano Stabellini wrote: > > On Fri, 10 Jun 2022, Bertrand Marquis wrote: >> cppcheck MISRA addon can be used to check for non compliance to some of >> the MISRA standard rules. >> >> Add a CPPCHECK_MISRA variable that can be set to "y" using make comman

Re: [PATCH v7 9/9] xen: retrieve reserved pages on populate_physmap

2022-06-22 Thread Jan Beulich
On 20.06.2022 04:44, Penny Zheng wrote: > When a static domain populates memory through populate_physmap at runtime, > it shall retrieve reserved pages from resv_page_list to make sure that > guest RAM is still restricted in statically configured memory regions. > This commit also introduces a new

Re: [PATCH] xen/console: do not drop serial output from the hardware domain

2022-06-22 Thread Jan Beulich
On 22.06.2022 11:09, Roger Pau Monné wrote: > On Wed, Jun 22, 2022 at 10:04:19AM +0200, Jan Beulich wrote: >> On 16.06.2022 13:31, Roger Pau Monné wrote: >>> On Tue, Jun 14, 2022 at 11:45:54AM +0200, Jan Beulich wrote: On 14.06.2022 11:38, Roger Pau Monné wrote: > On Tue, Jun 14, 2022 at 1

Re: disabling mercurial repositories

2022-06-22 Thread Jan Beulich
On 22.06.2022 10:47, Andrew Cooper wrote: > On 22/06/2022 09:41, Jan Beulich wrote: >> On 21.06.2022 15:48, Roger Pau Monné wrote: >>> Last week we had a bit of an emergency when a web crawler started >>> indexing all our mercurial repositories on xenbits, as caused the load >>> on xenbits to go be

Re: [PATCH] x86/mm: Add an early PGT_validated exit in _get_page_type()

2022-06-22 Thread Jan Beulich
On 17.06.2022 12:47, Andrew Cooper wrote: > This is a continuation of the cleanup and commenting in: > 9186e96b199e ("x86/pv: Clean up _get_page_type()") > 8cc5036bc385 ("x86/pv: Fix ABAC cmpxchg() race in _get_page_type()") > > With the re-arranged and newly commented logic, it's far more cle

Re: [PATCH] xen/console: do not drop serial output from the hardware domain

2022-06-22 Thread Roger Pau Monné
On Wed, Jun 22, 2022 at 11:33:32AM +0200, Jan Beulich wrote: > On 22.06.2022 11:09, Roger Pau Monné wrote: > > On Wed, Jun 22, 2022 at 10:04:19AM +0200, Jan Beulich wrote: > >> On 16.06.2022 13:31, Roger Pau Monné wrote: > >>> On Tue, Jun 14, 2022 at 11:45:54AM +0200, Jan Beulich wrote: > On 1

[libvirt test] 171306: regressions - FAIL

2022-06-22 Thread osstest service owner
flight 171306 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/171306/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-libvirt 6 libvirt-buildfail REGR. vs. 151777 build-amd64-libvirt

Re: [RFC PATCH 1/2] xen/memory : Add stats_table resource type

2022-06-22 Thread George Dunlap
> On 22 Jun 2022, at 09:59, Jan Beulich wrote: > [snip] > In general I also have to admit that I'm not sure the exposed data really > qualifies as a "resource", and hence I'm not really convinced of your use > of the resource mapping interface as a vehicle. I’m not sure if I’d call any of the

Re: [RFC PATCH 1/2] xen/memory : Add stats_table resource type

2022-06-22 Thread Jan Beulich
On 22.06.2022 12:05, George Dunlap wrote: >> On 22 Jun 2022, at 09:59, Jan Beulich wrote: >> > [snip] >> In general I also have to admit that I'm not sure the exposed data really >> qualifies as a "resource", and hence I'm not really convinced of your use >> of the resource mapping interface as a

Re: [PATCH] x86/mm: Add an early PGT_validated exit in _get_page_type()

2022-06-22 Thread Andrew Cooper
On 22/06/2022 10:58, Jan Beulich wrote: > On 17.06.2022 12:47, Andrew Cooper wrote: >> This is a continuation of the cleanup and commenting in: >> 9186e96b199e ("x86/pv: Clean up _get_page_type()") >> 8cc5036bc385 ("x86/pv: Fix ABAC cmpxchg() race in _get_page_type()") >> >> With the re-arrange

Re: [PATCH 5/9] include/public: Use explicitly specified types

2022-06-22 Thread Jan Beulich
On 20.06.2022 09:02, Michal Orzel wrote: > --- a/xen/include/public/physdev.h > +++ b/xen/include/public/physdev.h > @@ -211,8 +211,8 @@ struct physdev_manage_pci_ext { > /* IN */ > uint8_t bus; > uint8_t devfn; > -unsigned is_extfn; > -unsigned is_virtfn; > +unsigned int

Re: [PATCH v3 0/3] virtio: support requiring restricted access per device

2022-06-22 Thread Oleksandr
On 22.06.22 09:38, Juergen Gross wrote: Hello Juergen Instead of an all or nothing approach add support for requiring restricted memory access per device. Changes in V3: - new patches 1 + 2 - basically complete rework of patch 3 Juergen Gross (3): virtio: replace restricted mem access fl

Re: [PATCH 0/9] MISRA C 2012 8.1 rule fixes

2022-06-22 Thread Jan Beulich
On 20.06.2022 09:02, Michal Orzel wrote: > This series fixes all the findings for MISRA C 2012 8.1 rule, reported by > cppcheck 2.7 with misra addon, for Arm (arm32/arm64 - target allyesconfig). > Fixing this rule comes down to replacing implicit 'unsigned' with explicit > 'unsigned int' type as th

Re: [PATCH 9/9] drivers/acpi: Use explicitly specified types

2022-06-22 Thread Jan Beulich
On 20.06.2022 09:02, Michal Orzel wrote: > According to MISRA C 2012 Rule 8.1, types shall be explicitly > specified. Fix all the findings reported by cppcheck with misra addon > by substituting implicit type 'unsigned' to explicit 'unsigned int'. > > Signed-off-by: Michal Orzel > --- > This patc

Tentative fix for dom0 boot problem

2022-06-22 Thread Juergen Gross
Julien, could you please test the attached patches? Juergen From 7d6734e517b65c3702a279fc2c1fff5ba7927ef9 Mon Sep 17 00:00:00 2001 From: Juergen Gross Date: Wed, 22 Jun 2022 12:19:55 +0200 Subject: [PATCH 1/2] x86/xen: use clear_bss() for Xen PV guests Instead of clearing the bss area in asse

Re: Tentative fix for dom0 boot problem

2022-06-22 Thread Julien Grall
On 22/06/2022 11:45, Juergen Gross wrote: Julien, Hi Juergen, could you please test the attached patches? I am getting the following error: (XEN) d0v0 Unhandled: vec 14, #PF[0003] (XEN) Pagetable walk from 84001000: (XEN) L4[0x1ff] = 00046c004067 4004 (XEN) L3[

Re: [PATCH 5/9] include/public: Use explicitly specified types

2022-06-22 Thread Michal Orzel
On 22.06.2022 12:16, Jan Beulich wrote: > On 20.06.2022 09:02, Michal Orzel wrote: >> --- a/xen/include/public/physdev.h >> +++ b/xen/include/public/physdev.h >> @@ -211,8 +211,8 @@ struct physdev_manage_pci_ext { >> /* IN */ >> uint8_t bus; >> uint8_t devfn; >> -unsigned is_e

Re: [PATCH 9/9] drivers/acpi: Use explicitly specified types

2022-06-22 Thread Michal Orzel
On 22.06.2022 12:36, Jan Beulich wrote: > On 20.06.2022 09:02, Michal Orzel wrote: >> According to MISRA C 2012 Rule 8.1, types shall be explicitly >> specified. Fix all the findings reported by cppcheck with misra addon >> by substituting implicit type 'unsigned' to explicit 'unsigned int'. >>

[xen-unstable test] 171305: tolerable FAIL

2022-06-22 Thread osstest service owner
flight 171305 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/171305/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-xl-vhd7 xen-installfail pass in 171295 Tests which did not succeed, but

Re: [PATCH 9/9] drivers/acpi: Use explicitly specified types

2022-06-22 Thread Jan Beulich
On 22.06.2022 13:09, Michal Orzel wrote: > On 22.06.2022 12:36, Jan Beulich wrote: >> On 20.06.2022 09:02, Michal Orzel wrote: >>> --- a/xen/drivers/acpi/tables/tbutils.c >>> +++ b/xen/drivers/acpi/tables/tbutils.c >>> @@ -481,7 +481,7 @@ acpi_tb_parse_root_table(acpi_physical_address >>> rsdp_add

Re: Virtio on Xen with Rust

2022-06-22 Thread Viresh Kumar
On 28-04-22, 16:52, Oleksandr Tyshchenko wrote: > FYI, currently we are working on one feature to restrict memory access > using Xen grant mappings based on xen-grant DMA-mapping layer for Linux [1]. > And there is a working PoC on Arm based on an updated virtio-disk. As for > libraries, there is a

Re: Tentative fix for dom0 boot problem

2022-06-22 Thread Juergen Gross
On 22.06.22 12:50, Julien Grall wrote: On 22/06/2022 11:45, Juergen Gross wrote: Julien, Hi Juergen, could you please test the attached patches? I am getting the following error: (XEN) d0v0 Unhandled: vec 14, #PF[0003] (XEN) Pagetable walk from 84001000: (XEN)  L4[0x1ff] = 0

Re: XTF-on-ARM: Bugs

2022-06-22 Thread Bertrand Marquis
Hi Andrew and Christopher, I will not dig into the details of the issues you currently have but it seems you are trying to re-do the work we already did and have been using for quite a while. Currently we maintain the xtf on arm code in gitlab and we recently rebased it on the latest xtf master:

Re: [XEN PATCH v2.1 1/4] build,include: rework shell script for headers++.chk

2022-06-22 Thread Michal Orzel
Hi Anthony, On 21.06.2022 12:11, Anthony PERARD wrote: > The command line generated for headers++.chk by make is quite long, > and in some environment it is too long. This issue have been seen in > Yocto build environment. > > Error messages: > make[9]: execvp: /bin/sh: Argument list too long

Re: [PATCH 0/9] MISRA C 2012 8.1 rule fixes

2022-06-22 Thread Michal Orzel
Hi Jan, On 22.06.2022 12:25, Jan Beulich wrote: > On 20.06.2022 09:02, Michal Orzel wrote: >> This series fixes all the findings for MISRA C 2012 8.1 rule, reported by >> cppcheck 2.7 with misra addon, for Arm (arm32/arm64 - target allyesconfig). >> Fixing this rule comes down to replacing implici

Re: [PATCH 0/9] MISRA C 2012 8.1 rule fixes

2022-06-22 Thread Jan Beulich
On 22.06.2022 14:55, Michal Orzel wrote: > On 22.06.2022 12:25, Jan Beulich wrote: >> On 20.06.2022 09:02, Michal Orzel wrote: >>> This series fixes all the findings for MISRA C 2012 8.1 rule, reported by >>> cppcheck 2.7 with misra addon, for Arm (arm32/arm64 - target allyesconfig). >>> Fixing thi

Re: Tentative fix for dom0 boot problem

2022-06-22 Thread Julien Grall
Hi Juergen, On 22/06/2022 13:13, Juergen Gross wrote: On 22.06.22 12:50, Julien Grall wrote: On 22/06/2022 11:45, Juergen Gross wrote: Julien, Hi Juergen, could you please test the attached patches? I am getting the following error: (XEN) d0v0 Unhandled: vec 14, #PF[0003] (XEN) Pageta

[PATCH v4 0/2] Xen FF-A mediator

2022-06-22 Thread Jens Wiklander
Hi, This patch sets add a FF-A [1] mediator modeled after the TEE mediator already present in Xen. The FF-A mediator implements the subset of the FF-A 1.1 specification needed to communicate with OP-TEE using FF-A as transport mechanism instead of SMC/HVC as with the TEE mediator. It allows a simi

[PATCH v4 1/2] xen/arm: smccc: add support for SMCCCv1.2 extended input/output registers

2022-06-22 Thread Jens Wiklander
SMCCC v1.2 AArch64 allows x0-x17 to be used as both parameter registers and result registers for the SMC and HVC instructions. Arm Firmware Framework for Armv8-A specification makes use of x0-x7 as parameter and result registers. Let us add new interface to support this extended set of input/outp

[PATCH v4 2/2] xen/arm: add FF-A mediator

2022-06-22 Thread Jens Wiklander
Adds a FF-A version 1.1 [1] mediator to communicate with a Secure Partition in secure world. The implementation is the bare minimum to be able to communicate with OP-TEE running as an SPMC at S-EL1. This is loosely based on the TEE mediator framework and the OP-TEE mediator. [1] https://develope

Re: [PATCH 0/9] MISRA C 2012 8.1 rule fixes

2022-06-22 Thread Bertrand Marquis
Hi Jan, > On 22 Jun 2022, at 14:01, Jan Beulich wrote: > > On 22.06.2022 14:55, Michal Orzel wrote: >> On 22.06.2022 12:25, Jan Beulich wrote: >>> On 20.06.2022 09:02, Michal Orzel wrote: This series fixes all the findings for MISRA C 2012 8.1 rule, reported by cppcheck 2.7 with misra

[xen-unstable-smoke test] 171308: tolerable all pass - PUSHED

2022-06-22 Thread osstest service owner
flight 171308 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/171308/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [PATCH 0/9] MISRA C 2012 8.1 rule fixes

2022-06-22 Thread Jan Beulich
On 22.06.2022 15:55, Bertrand Marquis wrote: > Hi Jan, > >> On 22 Jun 2022, at 14:01, Jan Beulich wrote: >> >> On 22.06.2022 14:55, Michal Orzel wrote: >>> On 22.06.2022 12:25, Jan Beulich wrote: On 20.06.2022 09:02, Michal Orzel wrote: > This series fixes all the findings for MISRA C 20

Re: Tentative fix for dom0 boot problem

2022-06-22 Thread Juergen Gross
On 22.06.22 15:20, Julien Grall wrote: Hi Juergen, On 22/06/2022 13:13, Juergen Gross wrote: On 22.06.22 12:50, Julien Grall wrote: On 22/06/2022 11:45, Juergen Gross wrote: Julien, Hi Juergen, could you please test the attached patches? I am getting the following error: (XEN) d0v0 U

Re: [PATCH 0/9] MISRA C 2012 8.1 rule fixes

2022-06-22 Thread Bertrand Marquis
Hi, > On 22 Jun 2022, at 15:10, Jan Beulich wrote: > > On 22.06.2022 15:55, Bertrand Marquis wrote: >> Hi Jan, >> >>> On 22 Jun 2022, at 14:01, Jan Beulich wrote: >>> >>> On 22.06.2022 14:55, Michal Orzel wrote: On 22.06.2022 12:25, Jan Beulich wrote: > On 20.06.2022 09:02, Michal Or

Re: [PATCH v3 3/3] xen: don't require virtio with grants for non-PV guests

2022-06-22 Thread Juergen Gross
On 22.06.22 11:03, Oleksandr wrote: On 22.06.22 09:38, Juergen Gross wrote: Hello Juergen Commit fa1f57421e0b ("xen/virtio: Enable restricted memory access using Xen grant mappings") introduced a new requirement for using virtio devices: the backend now needs to support the VIRTIO_F_ACCESS_PL

[PATCH 0/8] xen/evtchn: implement static event channel signaling

2022-06-22 Thread Rahul Singh
The purpose of this patch series is to add static event channel signaling support to Xen on Arm based on design doc [1]. This patch series depends on patch series [2] to create event channel in Xen. [1] https://lists.xenproject.org/archives/html/xen-devel/2022-05/msg01160.html [2] https://patchw

[PATCH 1/8] xen/evtchn: make evtchn_bind_interdomain global

2022-06-22 Thread Rahul Singh
Event channel support will be added for dom0less domains to allocate static event channel. It is necessary to have access to the evtchn_bind_interdomain function to do that, so make evtchn_bind_interdomain global and also make it __must_check. Signed-off-by: Rahul Singh --- xen/common/event_chan

[PATCH 2/8] xen/evtchn: modify evtchn_alloc_unbound to allocate specified port

2022-06-22 Thread Rahul Singh
evtchn_alloc_unbound() always allocates the next available port. Static event channel support for dom0less domains requires allocating a specified port. Modify the evtchn_alloc_unbound() to accept the port number as an argument and allocate the specified port if available. If the port number argum

[PATCH 3/8] xen/evtchn: modify evtchn_bind_interdomain to allocate specified port

2022-06-22 Thread Rahul Singh
evtchn_bind_interdomain() always allocates the next available local port. Static event channel support for dom0less domains requires allocating a specified port. Modify the evtchn_bind_interdomain to accept the port number as an argument and allocate the specified port if available. If the port nu

[PATCH 4/8] xen/evtchn: modify evtchn_bind_interdomain to pass domain as argument

2022-06-22 Thread Rahul Singh
evtchn_bind_interdomain() finds the local domain from "current->domain" pointer. evtchn_bind_interdomain() will be called from the XEN to support static event channel during domain creation. "current" pointer is not valid at that time, therefore modify the evtchn_bind_interdomain() to pass domain

[PATCH 5/8] xen/evtchn: don't close the static event channel.

2022-06-22 Thread Rahul Singh
Guest can request the Xen to close the event channels. Ignore the request from guest to close the static channels as static event channels should not be closed. Add the new bool variable "is_static" in "struct evtchn" to mark the event channel static when creating the event channel. Signed-off-by

Re: [PATCH 0/9] MISRA C 2012 8.1 rule fixes

2022-06-22 Thread Jan Beulich
On 22.06.2022 16:27, Bertrand Marquis wrote: > Hi, > >> On 22 Jun 2022, at 15:10, Jan Beulich wrote: >> >> On 22.06.2022 15:55, Bertrand Marquis wrote: >>> Hi Jan, >>> On 22 Jun 2022, at 14:01, Jan Beulich wrote: On 22.06.2022 14:55, Michal Orzel wrote: > On 22.06.2022 12:25,

Re: [XEN PATCH v2.1 1/4] build,include: rework shell script for headers++.chk

2022-06-22 Thread Jan Beulich
On 22.06.2022 14:35, Michal Orzel wrote: > Hi Anthony, > > On 21.06.2022 12:11, Anthony PERARD wrote: >> The command line generated for headers++.chk by make is quite long, >> and in some environment it is too long. This issue have been seen in >> Yocto build environment. >> >> Error messages: >>

[PATCH 8/8] xen/arm: introduce new xen,enhanced property value

2022-06-22 Thread Rahul Singh
Introduce a new "xen,enhanced" dom0less property value "evtchn" to enable/disable event-channel interfaces for dom0less guests. The configurable option is for domUs only. For dom0 we always set the corresponding property in the Xen code to true. Signed-off-by: Rahul Singh --- xen/arch/arm/domai

[PATCH 7/8] xen: introduce xen-evtchn dom0less property

2022-06-22 Thread Rahul Singh
Introduce a new sub-node under /chosen node to establish static event channel communication between domains on dom0less systems. An event channel will be created beforehand to allow the domains to send notifications to each other. Signed-off-by: Rahul Singh --- docs/misc/arm/device-tree/booting

[PATCH 6/8] xen/evtchn: don't set notification in evtchn_bind_interdomain()

2022-06-22 Thread Rahul Singh
evtchn_bind_interdomain() sets the notification on the local port to handle the lost notification on remote unbound port. Static event-channel will be created during domain creation, there is no need to set the notification as remote domain is not alive. Signed-off-by: Rahul Singh --- xen/commo

Re: [PATCH 2/8] xen/evtchn: modify evtchn_alloc_unbound to allocate specified port

2022-06-22 Thread Julien Grall
Hi, On 22/06/2022 15:37, Rahul Singh wrote: evtchn_alloc_unbound() always allocates the next available port. Static event channel support for dom0less domains requires allocating a specified port. Modify the evtchn_alloc_unbound() to accept the port number as an argument and allocate the specif

Re: [PATCH 5/8] xen/evtchn: don't close the static event channel.

2022-06-22 Thread Julien Grall
Hi, On 22/06/2022 15:38, Rahul Singh wrote: Guest can request the Xen to close the event channels. Ignore the request from guest to close the static channels as static event channels should not be closed. Why do you want to prevent the guest to close static ports? The problem I can see is...

Re: Virtio on Xen with Rust

2022-06-22 Thread Oleksandr Tyshchenko
On Wed, Jun 22, 2022 at 2:49 PM Viresh Kumar wrote: > On 28-04-22, 16:52, Oleksandr Tyshchenko wrote: > > FYI, currently we are working on one feature to restrict memory access > > using Xen grant mappings based on xen-grant DMA-mapping layer for Linux > [1]. > > And there is a working PoC on Arm

[PATCH 1/3] xen/arm: shutdown: Fix MISRA C 2012 Rule 8.4 violation

2022-06-22 Thread Xenia Ragiadakou
Include header so that the declarations of the functions machine_halt() and machine_restart(), which have external linkage, are visible before the function definitions. Signed-off-by: Xenia Ragiadakou --- xen/arch/arm/shutdown.c | 1 + 1 file changed, 1 insertion(+) diff --git a/xen/arch/arm/s

[PATCH 3/3] xen/common: gunzip: Fix MISRA C 2012 Rule 8.4 violation

2022-06-22 Thread Xenia Ragiadakou
Include header so that the declarations of functions gzip_check() and perform_gunzip(), which have external linkage, are visible before the function definitions. Signed-off-by: Xenia Ragiadakou --- xen/common/gunzip.c | 1 + 1 file changed, 1 insertion(+) diff --git a/xen/common/gunzip.c b/xen

[PATCH 2/3] xen/lib: list-sort: Fix MISRA C 2012 Rule 8.4 violation

2022-06-22 Thread Xenia Ragiadakou
Include header so that the declaration of the function list_sort(), which has external linkage, is visible before the function definition. Signed-off-by: Xenia Ragiadakou --- xen/lib/list-sort.c | 1 + 1 file changed, 1 insertion(+) diff --git a/xen/lib/list-sort.c b/xen/lib/list-sort.c index

[PATCH] xen/common: device_tree: Fix MISRA C 2012 Rule 8.7 violation

2022-06-22 Thread Xenia Ragiadakou
The function __dt_n_size_cells() is referenced only in device_tree.c. Change the linkage of the function from external to internal by adding the storage-class specifier static to the function definition. This patch aims to resolve indirectly a MISRA C 2012 Rule 8.4 violation warning. Signed-off-b

Re: [PATCH v3 3/3] xen: don't require virtio with grants for non-PV guests

2022-06-22 Thread Oleksandr
On 22.06.22 17:35, Juergen Gross wrote: Hello Juergen On 22.06.22 11:03, Oleksandr wrote: On 22.06.22 09:38, Juergen Gross wrote: Hello Juergen Commit fa1f57421e0b ("xen/virtio: Enable restricted memory access using Xen grant mappings") introduced a new requirement for using virtio devi

Re: [PATCH 1/3] xen/arm: shutdown: Fix MISRA C 2012 Rule 8.4 violation

2022-06-22 Thread Bertrand Marquis
Hi Xenia, > On 22 Jun 2022, at 16:15, Xenia Ragiadakou wrote: > > Include header so that the declarations of the functions > machine_halt() and machine_restart(), which have external linkage, are visible > before the function definitions. > > Signed-off-by: Xenia Ragiadakou Reviewed-by: Bertr

Re: [PATCH 2/3] xen/lib: list-sort: Fix MISRA C 2012 Rule 8.4 violation

2022-06-22 Thread Bertrand Marquis
Hi Xenia, > On 22 Jun 2022, at 16:15, Xenia Ragiadakou wrote: > > Include header so that the declaration of the function > list_sort(), which has external linkage, is visible before the function > definition. > > Signed-off-by: Xenia Ragiadakou Reviewed-by: Bertrand Marquis Cheers Bertrand

Re: [PATCH 3/3] xen/common: gunzip: Fix MISRA C 2012 Rule 8.4 violation

2022-06-22 Thread Bertrand Marquis
Hi Xenia, > On 22 Jun 2022, at 16:15, Xenia Ragiadakou wrote: > > Include header so that the declarations of functions > gzip_check() > and perform_gunzip(), which have external linkage, are visible before the > function definitions. > > Signed-off-by: Xenia Ragiadakou Reviewed-by: Bertrand

Re: [PATCH v1 01/10] drivers/char: Add support for Xue USB3 debugger

2022-06-22 Thread Marek Marczykowski-Górecki
On Wed, Jun 15, 2022 at 04:25:54PM +0200, Jan Beulich wrote: > On 07.06.2022 16:30, Marek Marczykowski-Górecki wrote: > > From: Connor Davis > > --- /dev/null > > +++ b/xen/drivers/char/xue.c > > @@ -0,0 +1,957 @@ > > +/* > > + * drivers/char/xue.c > > + * > > + * Xen port for the xue debugger >

Problem loading linux 5.19 as PV dom0

2022-06-22 Thread Juergen Gross
A Linux kernel 5.19 can only be loaded as dom0, if it has been built with CONFIG_AMD_MEM_ENCRYPT enabled. This is due to the fact that otherwise the (relevant) last section of the built kernel has the NOLOAD flag set (it is still marked with SHF_ALLOC). I think at least the hypervisor needs to be

[PATCH 0/2] x86: fix brk area initialization

2022-06-22 Thread Juergen Gross
The brk area needs to be zeroed initially, like the .bss section. Juergen Gross (2): x86/xen: use clear_bss() for Xen PV guests x86: fix setup of brk area arch/x86/include/asm/setup.h | 3 +++ arch/x86/kernel/head64.c | 4 +++- arch/x86/xen/enlighten_pv.c | 8 ++-- arch/x86/xen/x

[PATCH 2/2] x86: fix setup of brk area

2022-06-22 Thread Juergen Gross
Commit e32683c6f7d2 ("x86/mm: Fix RESERVE_BRK() for older binutils") put the brk area into the .bss segment, causing it not to be cleared initially. As the brk area is used to allocate early page tables, these might contain garbage in not explicitly written entries. This is especially a problem fo

[PATCH 1/2] x86/xen: use clear_bss() for Xen PV guests

2022-06-22 Thread Juergen Gross
Instead of clearing the bss area in assembly code, use the clear_bss() function. This requires to pass the start_info address as parameter to xen_start_kernel() in order to avoid the xen_start_info being zeroed again. Signed-off-by: Juergen Gross --- arch/x86/include/asm/setup.h | 3 +++ arch/

Re: XTF-on-ARM: Bugs

2022-06-22 Thread Andrew Cooper
On 22/06/2022 13:32, Bertrand Marquis wrote: > Hi Andrew and Christopher, > > I will not dig into the details of the issues you currently have > but it seems you are trying to re-do the work we already did > and have been using for quite a while. > > Currently we maintain the xtf on arm code in git

[linux-linus test] 171307: regressions - FAIL

2022-06-22 Thread osstest service owner
flight 171307 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/171307/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ws16-amd64 8 xen-boot fail REGR. vs. 171277 test-amd64-amd64-do

Re: XTF-on-ARM: Bugs

2022-06-22 Thread Bertrand Marquis
Hi Andrew, > On 22 Jun 2022, at 17:28, Andrew Cooper wrote: > > On 22/06/2022 13:32, Bertrand Marquis wrote: >> Hi Andrew and Christopher, >> >> I will not dig into the details of the issues you currently have >> but it seems you are trying to re-do the work we already did >> and have been usin

Re: [PATCH] xen/arm: irq: Initialize the per-CPU IRQs while preparing the CPU

2022-06-22 Thread Julien Grall
Hi Stefano, On 15/06/2022 01:32, Stefano Stabellini wrote: On Tue, 14 Jun 2022, Julien Grall wrote: From: Julien Grall Commit 5047cd1d5dea "xen/common: Use enhanced ASSERT_ALLOC_CONTEXT in xmalloc()" extended the checks in _xmalloc() to catch any use of the helpers from context with interrupt

Re: [PATCH] xen/arm: smpboot: Allocate the CPU sibling/core maps while preparing the CPU

2022-06-22 Thread Julien Grall
On 15/06/2022 01:23, Stefano Stabellini wrote: On Tue, 14 Jun 2022, Michal Orzel wrote: On 14.06.2022 13:08, Julien Grall wrote: +    unsigned int rc = 0; ... here you are setting rc to 0 even though it will be reassigned. Furthermore, if rc is used only in case of CPU_UP_PREPARE, why not m

Re: [PATCH] xen: arm: Spin-up cpu instead PSCI CPU OFF

2022-06-22 Thread Julien Grall
Hi Dmytro, Title: It seems to suggest we are completely removing PSCI CPU off. I would suggest to rename to: xen/arm: Don't use stop_cpu() in halt_this_cpu() On 22/06/2022 08:24, dmitry.semen...@gmail.com wrote: From: Dmytro Semenets Use spin-up cpu with disabled interrupts instead PSCI CP

Re: [PATCH 0/9] MISRA C 2012 8.1 rule fixes

2022-06-22 Thread Stefano Stabellini
+Roberto Hi Roberto, A quick question about Rule 8.1. Michal sent a patch series to fix Xen against Rule 8.1 (here is a link if you are interested: https://marc.info/?l=xen-devel&m=165570851227125) Although we all generally agree that the changes are a good thing, there was a question about t

Re: [PATCH 2/3] xen/lib: list-sort: Fix MISRA C 2012 Rule 8.4 violation

2022-06-22 Thread Stefano Stabellini
On Wed, 22 Jun 2022, Xenia Ragiadakou wrote: > Include header so that the declaration of the function > list_sort(), which has external linkage, is visible before the function > definition. > > Signed-off-by: Xenia Ragiadakou Reviewed-by: Stefano Stabellini > --- > xen/lib/list-sort.c | 1 +

Re: [PATCH 3/3] xen/common: gunzip: Fix MISRA C 2012 Rule 8.4 violation

2022-06-22 Thread Stefano Stabellini
On Wed, 22 Jun 2022, Xenia Ragiadakou wrote: > Include header so that the declarations of functions > gzip_check() > and perform_gunzip(), which have external linkage, are visible before the > function definitions. > > Signed-off-by: Xenia Ragiadakou Reviewed-by: Stefano Stabellini > --- >

Re: [PATCH] xen/common: device_tree: Fix MISRA C 2012 Rule 8.7 violation

2022-06-22 Thread Stefano Stabellini
On Wed, 22 Jun 2022, Xenia Ragiadakou wrote: > The function __dt_n_size_cells() is referenced only in device_tree.c. > Change the linkage of the function from external to internal by adding > the storage-class specifier static to the function definition. > > This patch aims to resolve indirectly a

[ovmf test] 171311: all pass - PUSHED

2022-06-22 Thread osstest service owner
flight 171311 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/171311/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 3930d1791a0657a422d50f4d2e2d2683c36e34b8 baseline version: ovmf b97243dea3c95ad923fa4

Re: XTF-on-ARM: Bugs

2022-06-22 Thread Christopher Clark
On Wed, Jun 22, 2022 at 9:40 AM Bertrand Marquis wrote: > > Hi Andrew, > > > On 22 Jun 2022, at 17:28, Andrew Cooper wrote: > > > > On 22/06/2022 13:32, Bertrand Marquis wrote: > >> Hi Andrew and Christopher, > >> > >> I will not dig into the details of the issues you currently have > >> but it s

[xen-unstable-smoke test] 171314: tolerable all pass - PUSHED

2022-06-22 Thread osstest service owner
flight 171314 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/171314/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [PATCH v3] xen: Add MISRA support to cppcheck make rule

2022-06-22 Thread Stefano Stabellini
On Wed, 22 Jun 2022, Bertrand Marquis wrote: > Hi Stefano, > > > On 22 Jun 2022, at 01:00, Stefano Stabellini wrote: > > > > On Fri, 10 Jun 2022, Bertrand Marquis wrote: > >> cppcheck MISRA addon can be used to check for non compliance to some of > >> the MISRA standard rules. > >> > >> Add a C

[ovmf test] 171315: all pass - PUSHED

2022-06-22 Thread osstest service owner
flight 171315 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/171315/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf f304308e1cb21846a79fc8e4aa9ffa2cb1db3e4c baseline version: ovmf 3930d1791a0657a422d50

[linux-5.4 test] 171309: regressions - FAIL

2022-06-22 Thread osstest service owner
flight 171309 linux-5.4 real [real] flight 171317 linux-5.4 real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171309/ http://logs.test-lab.xenproject.org/osstest/logs/171317/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: t

[xen-unstable test] 171310: tolerable FAIL - PUSHED

2022-06-22 Thread osstest service owner
flight 171310 xen-unstable real [real] flight 171316 xen-unstable real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171310/ http://logs.test-lab.xenproject.org/osstest/logs/171316/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd6

[linux-linus test] 171313: regressions - FAIL

2022-06-22 Thread osstest service owner
flight 171313 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/171313/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ws16-amd64 8 xen-boot fail REGR. vs. 171277 test-amd64-amd64-do

[qemu-mainline test] 171312: tolerable FAIL - PUSHED

2022-06-22 Thread osstest service owner
flight 171312 qemu-mainline real [real] flight 171321 qemu-mainline real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171312/ http://logs.test-lab.xenproject.org/osstest/logs/171321/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-am

RE: [PATCH v6 3/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests using legacy SSBD

2022-06-22 Thread Henry Wang
Hi Jan (and Andrew), > -Original Message- > From: Jan Beulich > On 17.06.2022 05:26, Henry Wang wrote: > > It seems that this series [1] has been stale for more than a month and also > > this series seems to be properly reviewed and acked already. > > > > From what Jan has replied to Roge

Re: Virtio on Xen with Rust

2022-06-22 Thread Viresh Kumar
On 22-06-22, 18:05, Oleksandr Tyshchenko wrote: > Even leaving > aside the fact that restricted virtio memory access in the guest means that > not all of guest memory can be accessed, so even having pre-maped guest > memory in advance, we are not able to calculate a host pointer as we don't > know