Re: [PATCH v5 2/5] xen: add bitmap to indicate per-domain state changes

2024-12-19 Thread Jan Beulich
On 18.12.2024 08:15, Jürgen Groß wrote: > On 17.12.24 17:12, Jan Beulich wrote: >> On 17.12.2024 16:55, Jürgen Groß wrote: >>> On 17.12.24 16:19, Jan Beulich wrote: On 17.12.2024 15:22, Juergen Gross wrote: > Add a bitmap with one bit per possible domid indicating the respective > doma

Re: [PATCH 41/71] hw/net: Constify all Property

2024-12-19 Thread Akihiko Odaki
On 2024/12/14 4:07, Richard Henderson wrote: Signed-off-by: Richard Henderson Reviewed-by: Akihiko Odaki

Re: [PATCH v3] x86/hvm: Use constants for x86 modes

2024-12-19 Thread Jan Beulich
On 18.12.2024 18:08, Andrew Cooper wrote: > @@ -2952,11 +2954,11 @@ static const char *guest_x86_mode_to_str(int mode) > { > switch ( mode ) > { > -case 0: return "Real"; > -case 1: return "v86"; > -case 2: return "16bit"; > -case 4: return "32bit"; > -case 8: re

Re: [RFC PATCH] xen/kconfig: allow LATE_HWDOM config for ARM

2024-12-19 Thread Michal Orzel
On 18/12/2024 17:26, Daniel P. Smith wrote: > > > Hey Michal, > > On 12/18/24 06:04, Michal Orzel wrote: >> Hi Daniel, >> >> On 18/12/2024 02:17, Daniel P. Smith wrote: >>> >>> On 17/12/2024 11:47, Sergiy Kibrik wrote: > Allow to build ARM configuration with support for initializing

Re: [PATCH 1/1] xen/common: Remove dead code

2024-12-19 Thread Jan Beulich
On 19.12.2024 00:34, Ariel Otilibili wrote: > The if-statement tests `res` is non-zero; meaning the case zero is never > reached. > > Coverity-ID: 1055253 > Fixes: e2b1ebf4de ("x86: Support booting a bzImage format domain 0 kernel.") > Signed-off-by: Ariel Otilibili I certainly agree with the c

Re: [PATCH v3 1/6] xen/arm: firmware: Add SCMI over SMC calls handling layer

2024-12-19 Thread Michal Orzel
On 18/12/2024 15:58, Andrei Cherechesu wrote: > > > Hi Michal, > > Thank you for the review. > > On 18/12/2024 16:26, Michal Orzel wrote: >> >> On 18/12/2024 11:11, Andrei Cherechesu (OSS) wrote: >>> >>> From: Andrei Cherechesu >>> >>> Introduce the SCMI-SMC layer to have some basic degree

Re: [PATCH v2] tools/libxg: Don't gunzip the guests initrd

2024-12-19 Thread Jan Beulich
On 18.12.2024 19:54, Andrew Cooper wrote: > Decompressing the kernel is necessary to inspect the ELF notes, but the > dombuilder will gunzip() secondary modules too. Specifically gunzip(), no > other decompression algorithms. > > This may have been necessary in the dim and distant past, but it is

Re: [PATCH v2] misra: add deviation for MISRA C Rule R11.8.

2024-12-19 Thread Jan Beulich
On 18.12.2024 15:25, Alessandro Zucchelli wrote: > Rule 11.8 states as following: "A cast shall not remove any `const' or > `volatile' qualification from the type pointed to by a pointer". > > Function `__hvm_copy' in `xen/arch/x86/hvm/hvm.c' is a double-use > function, where the parameter needs t

Re: [PATCH v2] misra: add deviation for MISRA C Rule R11.8.

2024-12-19 Thread Nicola Vetrini
On 2024-12-19 09:49, Jan Beulich wrote: On 18.12.2024 15:25, Alessandro Zucchelli wrote: Rule 11.8 states as following: "A cast shall not remove any `const' or `volatile' qualification from the type pointed to by a pointer". Function `__hvm_copy' in `xen/arch/x86/hvm/hvm.c' is a double-use func

Re: [PATCH v2] misra: add deviation for MISRA C Rule R11.8.

2024-12-19 Thread Jan Beulich
On 19.12.2024 09:58, Nicola Vetrini wrote: > On 2024-12-19 09:49, Jan Beulich wrote: >> On 18.12.2024 15:25, Alessandro Zucchelli wrote: >>> Rule 11.8 states as following: "A cast shall not remove any `const' or >>> `volatile' qualification from the type pointed to by a pointer". >>> >>> Function `

Re: [PATCH 0/3] include: Cleanups around 'exec/cpu-common.h' header

2024-12-19 Thread Philippe Mathieu-Daudé
On 17/12/24 16:13, Philippe Mathieu-Daudé wrote: Philippe Mathieu-Daudé (3): hw/xen: Remove unnecessary 'exec/cpu-common.h' header system/numa: Remove unnecessary 'exec/cpu-common.h' header system/accel-ops: Remove unnecessary 'exec/cpu-common.h' header Series queued.

Re: [PATCH] xen/sched: Untangle credit2 vs cpu_nr_siblings()

2024-12-19 Thread Shawn Anastasio
Hi Andrew, On 12/18/24 6:49 AM, Andrew Cooper wrote: > Credit2 has no buisness including asm/cpufeature.h or asm/processor.h. > > This was caused by a bad original abstraction, and an even less wise attempt > to fix the build on my behalf. It is also the sole reason why PPC and RISC-V > need cpu

Re: [PATCH v2] tools/libxg: Don't gunzip the guests initrd

2024-12-19 Thread Oleksii Kurochko
On 12/18/24 7:54 PM, Andrew Cooper wrote: Decompressing the kernel is necessary to inspect the ELF notes, but the dombuilder will gunzip() secondary modules too. Specifically gunzip(), no other decompression algorithms. This may have been necessary in the dim and distant past, but it is broken

Re: Xen 4.20 Development Update [November]

2024-12-19 Thread Jan Beulich
On 04.12.2024 11:20, Oleksii Kurochko wrote: > This email only tracks big items for xen.git tree. Please reply for items you > would like to see in 4.20 so that people have an idea what is going on and > prioritise accordingly. > > You're welcome to provide description and use cases of the feature

Re: [PATCH v3] x86/hvm: Use constants for x86 modes

2024-12-19 Thread Teddy Astie
Hello, Le 18/12/2024 à 18:08, Andrew Cooper a écrit : > From: Teddy Astie > > In many places of x86 HVM code, constants integer are used to indicate in > what mode is > running the CPU (real, vm86, 16-bits, 32-bits, 64-bits). However, these > constants are > are written directly as integer whic

Re: [XEN PATCH] ioreq: fix check for CONFIG_ARCH_VCPU_IOREQ_COMPLETION

2024-12-19 Thread Andrew Cooper
On 19/12/2024 11:13 am, Sergiy Kibrik wrote: > It should be CONFIG_ARCH_VCPU_IOREQ_COMPLETION (as in Kconfig) and not > misspelled CONFIG_VCPU_ARCH_IOREQ_COMPLETION. > Bug introduced by: > > 979cfdd3e5 ioreq: do not build arch_vcpu_ioreq_completion() for non-VMX > configurations > > Signed-off-by:

Re: [PATCH v3] x86/hvm: Use constants for x86 modes

2024-12-19 Thread Teddy Astie
Le 19/12/2024 à 12:35, Andrew Cooper a écrit : > On 19/12/2024 10:46 am, Teddy Astie wrote: >> Hello, >> >> Le 18/12/2024 à 18:08, Andrew Cooper a écrit : >>> From: Teddy Astie >>> >>> In many places of x86 HVM code, constants integer are used to indicate in >>> what mode is >>> running the CPU (

Re: [PATCH 11/15] x86/hyperlaunch: add domain id parsing to domain config

2024-12-19 Thread Daniel P. Smith
On 12/11/24 11:21, Daniel P. Smith wrote: On 12/2/24 07:02, Jan Beulich wrote: On 23.11.2024 19:20, Daniel P. Smith wrote: --- a/xen/arch/x86/domain_builder/fdt.h +++ b/xen/arch/x86/domain_builder/fdt.h @@ -27,6 +27,24 @@ static inline int __init fdt_cell_as_u64(const fdt32_t *cell, uint64_t *

Xen 4.18.4 released

2024-12-19 Thread Jan Beulich
All, we're pleased to announce the release of another bug fixing Xen version. Xen 4.18.4 is available from its git repository http://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.18 (tag RELEASE-4.18.4) or from the XenProject download page https://xenproject.org/resources/dow

Re: [PATCH v2] drop setting XEN_QEMU_CONSOLE_LIMIT in the environment

2024-12-19 Thread Anthony PERARD
> commit 7b89ea44dbcb965b6b67c8de5092ea2b95d4c6f9 > Author: James Dingwall > Date: Tue Nov 5 11:16:20 2024 + > > libxl: drop setting XEN_QEMU_CONSOLE_LIMIT in the environment (XSA-180 / > CVE-2014-3672) > > The corresponding code in the Xen qemu repository was not applied from

Re: Xen 4.18.4 released

2024-12-19 Thread Jan Beulich
On 19.12.2024 16:37, Jan Beulich wrote: > Xen 4.18.4 is available from its git repository > http://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.18 > (tag RELEASE-4.18.4) or from the XenProject download page > https://xenproject.org/resources/downloads/. > > We recommend all u

Linux 6.13-rc3 many different panics in Xen PV dom0

2024-12-19 Thread Marek Marczykowski-Górecki
Hi, It crashes on boot like below, most of the times. But sometimes (rarely) it manages to stay alive. Below I'm pasting few of the crashes that look distinctly different, if you follow the links, you can find more of them. IMHO it looks like some memory corruption bug somewhere. I tested also Lin

[PATCH v3] docs: fusa: Add dom0less domain configuration requirements

2024-12-19 Thread Ayan Kumar Halder
From: Michal Orzel Add requirements for dom0less domain creation. Signed-off-by: Michal Orzel Signed-off-by: Ayan Kumar Halder --- Changes from - v1 - 1. As the dom0less domain creation requirements specifies the dt properties for creating domains, it has been moved to product requirements. P

[XEN PATCH v2] xen: introduce kconfig options to disable hypercalls

2024-12-19 Thread Sergiy Kibrik
From: Stefano Stabellini It can be beneficial for some dom0less systems to further reduce Xen footprint and disable some hypercalls handling code, which may not to be used & required in such systems. Each hypercall has a separate option to keep configuration flexible. Options to disable hypercal

[PATCH] automation: pin down CONFIG_QEMU_PLATFORM for RISC-V's randconfig job

2024-12-19 Thread Oleksii Kurochko
Except setting CONFIG_QEMU_PLATFORM=y in tiny64_defconfig, CONFIG_QEMU_PLATFORM should be fixed for RISC-V's randconfig job. Otherwise, an expected compilation error for RISC-V's randconfig job will occur since clean_and_invalidate_dcache_va_range() and clean_dcache_va_range() are currently impleme

Re: [PATCH v3 1/7] xen/riscv: update layout table in config.h

2024-12-19 Thread Jan Beulich
On 17.12.2024 17:32, Oleksii Kurochko wrote: > Make all upper bounds (end addresses) for areas inclusive to align > with the corresponding definitions. > > For the Direct map region, the upper bound was calculated incorrectly > in efadb18dd58aba ("xen/riscv: add VM space layout"). It should be > 0

Re: [PATCH 1/1] xen/common: Remove dead code

2024-12-19 Thread Ariel Otilibili-Anieli
On Thursday, December 19, 2024 09:32 CET, Jan Beulich wrote: > On 19.12.2024 00:34, Ariel Otilibili wrote: > > The if-statement tests `res` is non-zero; meaning the case zero is never > > reached. > > > > Coverity-ID: 1055253 > > Fixes: e2b1ebf4de ("x86: Support booting a bzImage format domain

Re: [PATCH] xen/sched: Untangle credit2 vs cpu_nr_siblings()

2024-12-19 Thread Oleksii Kurochko
On 12/18/24 1:49 PM, Andrew Cooper wrote: Credit2 has no buisness including asm/cpufeature.h or asm/processor.h. This was caused by a bad original abstraction, and an even less wise attempt to fix the build on my behalf. It is also the sole reason why PPC and RISC-V need cpufeature.h header. W

Re: [PATCH v3 5/7] xen/riscv: implement data and instruction cache operations

2024-12-19 Thread Jan Beulich
On 17.12.2024 17:32, Oleksii Kurochko wrote: > Implement following cache operations: > - clean_and_invalidate_dcache_va_range() > - clean_dcache_va_range() > - invalidate_icache() > > The first two functions may require support for the CMO (Cache Management > Operations) extension and/or hardware-

Re: [PATCH] tools/xg: increase LZMA_BLOCK_SIZE for uncompressing the kernel

2024-12-19 Thread Anthony PERARD
On Wed, Dec 18, 2024 at 06:58:25PM +0100, Roger Pau Monné wrote: > On Tue, Oct 08, 2024 at 11:32:23PM +0200, Marek Marczykowski-Górecki wrote: > > Linux 6.12-rc2 fails to decompress with the current 128MiB, contrary to > > the code comment. It results in a failure like this: > > > > domainbuild

[XEN PATCH] ioreq: fix check for CONFIG_ARCH_VCPU_IOREQ_COMPLETION

2024-12-19 Thread Sergiy Kibrik
It should be CONFIG_ARCH_VCPU_IOREQ_COMPLETION (as in Kconfig) and not misspelled CONFIG_VCPU_ARCH_IOREQ_COMPLETION. Bug introduced by: 979cfdd3e5 ioreq: do not build arch_vcpu_ioreq_completion() for non-VMX configurations Signed-off-by: Sergiy Kibrik --- xen/arch/x86/hvm/ioreq.c | 2 +- xen/i

[PATCH 1/1] lib: Remove dead code

2024-12-19 Thread Ariel Otilibili
This is a follow up from a discussion in Xen: The if-statement tests `res` is non-zero; meaning the case zero is never reached. Link: https://lore.kernel.org/all/7587b503-b2ca-4476-8dc9-e9683d4ca...@suse.com/ Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Suggested-by: Jan Beulich Signed-off-by: Arie

[PATCH 0/1] lib: Remove dead code

2024-12-19 Thread Ariel Otilibili
Hello, This patch removes a dead code in lib/inflate.c; it follows from a discussion in Xen. The dead code is tracked by Coverity-ID 1055253 in Xen, was triggered by a file taken unmodified from Linux. Thank you, Link: https://lore.kernel.org/all/7587b503-b2ca-4476-8dc9-e9683d4ca...@suse.com/

Re: [PATCH 1/1] xen/common: Remove dead code

2024-12-19 Thread Ariel Otilibili-Anieli
On Thursday, December 19, 2024 10:10 CET, "Ariel Otilibili-Anieli" wrote: > On Thursday, December 19, 2024 09:32 CET, Jan Beulich > wrote: > > > On 19.12.2024 00:34, Ariel Otilibili wrote: > > > The if-statement tests `res` is non-zero; meaning the case zero is never > > > reached. > > > >

Re: [PATCH v4 1/6] xen/arm: firmware: Add SCMI over SMC calls handling layer

2024-12-19 Thread Michal Orzel
On 19/12/2024 12:23, Andrei Cherechesu (OSS) wrote: > > > From: Andrei Cherechesu > > Introduce the SCMI-SMC layer to have some basic degree of > awareness about SCMI calls that are based on the ARM System > Control and Management Interface (SCMI) specification (DEN0056E). > > The SCMI spec

Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1

2024-12-19 Thread Mark Rutland
Hi Arnd, On Wed, Sep 25, 2024 at 03:58:38PM +, Arnd Bergmann wrote: > On Wed, Sep 25, 2024, at 15:01, Ard Biesheuvel wrote: > > From: Ard Biesheuvel > > > > Bump the minimum GCC version to 8.1 to gain unconditional support for > > referring to the per-task stack cookie using a symbol rather t

Re: [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1

2024-12-19 Thread Arnd Bergmann
On Thu, Dec 19, 2024, at 12:53, Mark Rutland wrote: > On Wed, Sep 25, 2024 at 03:58:38PM +, Arnd Bergmann wrote: >> On Wed, Sep 25, 2024, at 15:01, Ard Biesheuvel wrote: >> > From: Ard Biesheuvel >> >> We obviously need to go through all the other version checks >> to see what else can be cle

Re: [PATCH v3 1/6] xen/arm: firmware: Add SCMI over SMC calls handling layer

2024-12-19 Thread Andrei Cherechesu
Hi Michal, On 19/12/2024 10:35, Michal Orzel wrote: > > On 18/12/2024 15:58, Andrei Cherechesu wrote: >> >> Hi Michal, >> >> Thank you for the review. >> >> On 18/12/2024 16:26, Michal Orzel wrote: >>> On 18/12/2024 11:11, Andrei Cherechesu (OSS) wrote: From: Andrei Cherechesu Intr

[PATCH v4 5/6] SUPPORT.md: Describe SCMI-SMC layer feature

2024-12-19 Thread Andrei Cherechesu (OSS)
From: Andrei Cherechesu Describe the layer which enables SCMI over SMC calls forwarding to EL3 FW if issued by the Hardware domain. If the SCMI firmware node is not found in the Host DT during initialization, it fails silently as it's not mandatory. The SCMI SMCs trapping at EL2 now lets hwdom p

[PATCH v4 3/6] xen/arm: platforms: Add NXP S32G3 Processors config

2024-12-19 Thread Andrei Cherechesu (OSS)
From: Andrei Cherechesu Platforms based on NXP S32G3 processors use the NXP LINFlexD UART driver for console by default, and rely on Dom0 having access to SCMI services for system-level resources from firmware at EL3. Signed-off-by: Andrei Cherechesu Reviewed-by: Bertrand Marquis --- xen/arch

[PATCH v4 0/6] xen/arm: Add support for S32CC platforms and LINFlexD UART

2024-12-19 Thread Andrei Cherechesu (OSS)
From: Andrei Cherechesu Targeting: Xen 4.20 This v4 version of this patch series finishes the work left to support NXP S32G3 Processors [0], part of the NXP S32CC Family. The LINFlexD UART support patches have been merged in v2. Platforms using S32G3 Processors are not affected by the TLBI by VA

[PATCH v4 6/6] MAINTAINERS: Add myself as maintainer for NXP S32G3

2024-12-19 Thread Andrei Cherechesu (OSS)
From: Andrei Cherechesu Add myself as maintainer for NXP S32G3 SoCs Family, and the S32 Linux Team as relevant reviewers list. Signed-off-by: Andrei Cherechesu Acked-by: Bertrand Marquis Acked-by: Michal Orzel --- MAINTAINERS | 6 ++ 1 file changed, 6 insertions(+) diff --git a/MAINTAIN

[PATCH v4 1/6] xen/arm: firmware: Add SCMI over SMC calls handling layer

2024-12-19 Thread Andrei Cherechesu (OSS)
From: Andrei Cherechesu Introduce the SCMI-SMC layer to have some basic degree of awareness about SCMI calls that are based on the ARM System Control and Management Interface (SCMI) specification (DEN0056E). The SCMI specification includes various protocols for managing system-level resources, s

[PATCH v4 2/6] xen/arm: vsmc: Enable handling SiP-owned SCMI SMC calls

2024-12-19 Thread Andrei Cherechesu (OSS)
From: Andrei Cherechesu Change the handling of SiP SMC calls to be more generic, instead of directly relying on the `platform_smc()` callback implementation. Try to handle the SiP SMC first through the `platform_smc()` callback (if implemented). Otherwise, try to handle it as SCMI message. Sign

[PATCH v4 4/6] CHANGELOG.md: Add NXP S32G3 and SCMI-SMC layer support mentions

2024-12-19 Thread Andrei Cherechesu (OSS)
From: Andrei Cherechesu Signed-off-by: Andrei Cherechesu Reviewed-by: Bertrand Marquis Acked-by: Oleksii Kurochko --- CHANGELOG.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 15f681459f..bda43b1efb 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1

Re: [PATCH v3] x86/hvm: Use constants for x86 modes

2024-12-19 Thread Andrew Cooper
On 19/12/2024 10:46 am, Teddy Astie wrote: > Hello, > > Le 18/12/2024 à 18:08, Andrew Cooper a écrit : >> From: Teddy Astie >> >> In many places of x86 HVM code, constants integer are used to indicate in >> what mode is >> running the CPU (real, vm86, 16-bits, 32-bits, 64-bits). However, these >

[PATCH 2/2] x86: Add Support for Paging-Write Feature

2024-12-19 Thread Petr Beneš
From: Petr Beneš This patch introduces a new XENMEM_access_r_pw permission. Functionally, it is similar to XENMEM_access_r, but for processors with TERTIARY_EXEC_EPT_PAGING_WRITE support (Intel 12th Gen/Alder Lake and later), it also permits the CPU to write to the page during guest page-table

[PATCH 0/2] x86: Add Support for Paging-Write Feature

2024-12-19 Thread Petr Beneš
From: Petr Beneš This patch introduces a new XENMEM_access_r_pw permission. Functionally, it is similar to XENMEM_access_r, but for processors with TERTIARY_EXEC_EPT_PAGING_WRITE support (Intel 12th Gen/Alder Lake and later), it also permits the CPU to write to the page during guest page-table

[PATCH 1/2] x86: Rename _rsvd field to pw and move it to the bit 58

2024-12-19 Thread Petr Beneš
From: Petr Beneš The EPT Paging-write feature (when enabled by the TERTIARY_EXEC_EPT_PAGING_WRITE bit) uses bit 58 of the EPT entry to indicate that guest paging may update the page, even if the W access is not set. This patch is a preparation for the EPT Paging-write feature. --- xen/arch/x8

[PATCH 1/1] xen/scripts: Fix regex syntax warnings with Python 3.12

2024-12-19 Thread Ariel Otilibili
Same fix than commit 826a9eb072 (tools: Fix regex syntax warnings with Python 3.12). It clears out the warning: ``` $ xen/scripts/xen-analysis.py xen/scripts/xen_analysis/cppcheck_analysis.py:94: SyntaxWarning: invalid escape sequence '\*' comment_line_starts = re.match('^[ \t]*/\*.*$', line)

[PATCH 0/1] xen/scripts: Fix regex syntax warnings with Python 3.12

2024-12-19 Thread Ariel Otilibili
Hello, This patch clears out this warning: ``` $ xen/scripts/xen-analysis.py xen/scripts/xen_analysis/cppcheck_analysis.py:94: SyntaxWarning: invalid escape sequence '\*' comment_line_starts = re.match('^[ \t]*/\*.*$', line) ``` It is the same fix than commit 826a9eb072 (tools: Fix regex synt

Re: [PATCH 1/1] xen/scripts: Fix regex syntax warnings with Python 3.12

2024-12-19 Thread Ariel Otilibili-Anieli
CCing Luca Fancellu. On Thursday, December 19, 2024 19:10 CET, Ariel Otilibili wrote: > Same fix than commit 826a9eb072 (tools: Fix regex syntax warnings with Python > 3.12). > > It clears out the warning: > > ``` > $ xen/scripts/xen-analysis.py > xen/scripts/xen_analysis/cppcheck_analysis.p

[PATCH v2 2/2] x86: Add Support for Paging-Write Feature

2024-12-19 Thread Petr Beneš
From: Petr Beneš This patch introduces a new XENMEM_access_r_pw permission. Functionally, it is similar to XENMEM_access_r, but for processors with TERTIARY_EXEC_EPT_PAGING_WRITE support (Intel 12th Gen/Alder Lake and later), it also permits the CPU to write to the page during guest page-table

[PATCH v2 0/2] x86: Add Support for Paging-Write Feature

2024-12-19 Thread Petr Beneš
From: Petr Beneš Changes since v1: - Added signed-off-by tags This patch introduces a new XENMEM_access_r_pw permission. Functionally, it is similar to XENMEM_access_r, but for processors with TERTIARY_EXEC_EPT_PAGING_WRITE support (Intel 12th Gen/Alder Lake and later), it also permits the CP

[PATCH v2 1/2] x86: Rename _rsvd field to pw and move it to the bit 58

2024-12-19 Thread Petr Beneš
From: Petr Beneš The EPT Paging-write feature (when enabled by the TERTIARY_EXEC_EPT_PAGING_WRITE bit) uses bit 58 of the EPT entry to indicate that guest paging may update the page, even if the W access is not set. This patch is a preparation for the EPT Paging-write feature. Signed-off-by:

[RFC PATCH Hyperlaunch v2] xenconsole: Add connected flag

2024-12-19 Thread Jason Andryuk
Sending again with an expanded description. RFC to have a discussion about the approach. With hyperlaunch, a domU can start before its console ring is connected by xenconsoled. With nothing emptying the ring, it can quickly fill during boot. In domU_write_console(), __write_console returns 0 wh

[PATCH v2 0/1] lib: Remove dead code

2024-12-19 Thread Ariel Otilibili
Hello, This patch removes a dead code in lib/inflate.c; it follows from a discussion in Xen. The dead code is tracked by Coverity-ID 1055253 in Xen, was triggered by a file taken unmodified from Linux. Thank you, Link: https://lore.kernel.org/all/7587b503-b2ca-4476-8dc9-e9683d4ca...@suse.com/ -

[PATCH v2 1/1] lib: Remove dead code

2024-12-19 Thread Ariel Otilibili
This is a follow up from a discussion in Xen: The if-statement tests `res` is non-zero; meaning the case zero is never reached. Link: https://lore.kernel.org/all/7587b503-b2ca-4476-8dc9-e9683d4ca...@suse.com/ Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Suggested-by: Jan Beulich Signed-off-by: Arie

Re: [PATCH v2 1/1] lib: Remove dead code

2024-12-19 Thread Greg KH
On Thu, Dec 19, 2024 at 11:45:01PM +0100, Ariel Otilibili wrote: > This is a follow up from a discussion in Xen: > > The if-statement tests `res` is non-zero; meaning the case zero is never > reached. > > Link: > https://lore.kernel.org/all/7587b503-b2ca-4476-8dc9-e9683d4ca...@suse.com/ > Fixes

Re: [PATCH 0/2] x86: Add Support for Paging-Write Feature

2024-12-19 Thread Andrew Cooper
On 19/12/2024 6:16 pm, Petr Beneš wrote: > From: Petr Beneš > > This patch introduces a new XENMEM_access_r_pw permission. Functionally, it > is similar to XENMEM_access_r, but for processors with > TERTIARY_EXEC_EPT_PAGING_WRITE support (Intel 12th Gen/Alder Lake and later), > it also permits

Re: [PATCH 2/2] x86: Add Support for Paging-Write Feature

2024-12-19 Thread Tamas K Lengyel
> > diff --git a/xen/arch/x86/mm/p2m-ept.c b/xen/arch/x86/mm/p2m-ept.c > > index 21728397f9..5ad78ae4b5 100644 > > --- a/xen/arch/x86/mm/p2m-ept.c > > +++ b/xen/arch/x86/mm/p2m-ept.c > > @@ -176,6 +176,10 @@ static void ept_p2m_type_to_flags(const struct > > p2m_domain *p2m, > > break

Re: [Linux-6.12.y] XEN: CVE-2024-53241 / XSA-466 and Clang-kCFI

2024-12-19 Thread Andrew Cooper
On 20/12/2024 12:27 am, Sedat Dilek wrote: > On Fri, Dec 20, 2024 at 12:26 AM Andrew Cooper > wrote: >> On 19/12/2024 11:10 pm, Sedat Dilek wrote: >>> On Thu, Dec 19, 2024 at 6:07 PM Sedat Dilek wrote: On Thu, Dec 19, 2024 at 5:44 PM Andrew Cooper wrote: > On 19/12/2024 4:14 pm, S

Re: Linux 6.13-rc3 many different panics in Xen PV dom0

2024-12-19 Thread Marek Marczykowski-Górecki
On Thu, Dec 19, 2024 at 05:14:52PM +0100, Marek Marczykowski-Górecki wrote: > Hi, > > It crashes on boot like below, most of the times. But sometimes (rarely) > it manages to stay alive. Below I'm pasting few of the crashes that look > distinctly different, if you follow the links, you can find mo

Re: + lib-remove-dead-code.patch added to mm-nonmm-unstable branch

2024-12-19 Thread Ariel Otilibili-Anieli
On Friday, December 20, 2024 00:13 CET, Andrew Morton wrote: > > The patch titled > Subject: lib/inflate.c: remove dead code > has been added to the -mm mm-nonmm-unstable branch. Its filename is > lib-remove-dead-code.patch > > This patch will shortly appear at > > https://git

Re: [PATCH 2/2] x86: Add Support for Paging-Write Feature

2024-12-19 Thread Tamas K Lengyel
On Thu, Dec 19, 2024 at 1:17 PM Petr Beneš wrote: > > From: Petr Beneš > > This patch introduces a new XENMEM_access_r_pw permission. Functionally, it > is similar to XENMEM_access_r, but for processors with > TERTIARY_EXEC_EPT_PAGING_WRITE support (Intel 12th Gen/Alder Lake and later), > it a

Re: [PATCH v4 0/6] xen/arm: Add support for S32CC platforms and LINFlexD UART

2024-12-19 Thread Michal Orzel
On 19/12/2024 12:23, Andrei Cherechesu (OSS) wrote: > > > From: Andrei Cherechesu > > Targeting: Xen 4.20 > This v4 version of this patch series finishes the work left to support NXP > S32G3 Processors [0], part of the NXP S32CC Family. The LINFlexD UART support > patches have been merged in

Re: [PATCH v13 00/12] Arm cache coloring

2024-12-19 Thread Michal Orzel
On 17/12/2024 18:06, Carlo Nonato wrote: > > > Shared caches in multi-core CPU architectures represent a problem for > predictability of memory access latency. This jeopardizes applicability > of many Arm platform in real-time critical and mixed-criticality > scenarios. We introduce support fo