[PATCH][4.15] crypto: adjust rijndaelEncrypt() prototype for gcc11

2021-02-28 Thread Jan Beulich
The upcoming release complains, not entirely unreasonably: In file included from rijndael.c:33: .../xen/include/crypto/rijndael.h:55:53: note: previously declared as 'const unsigned char[]' 55 | voidrijndaelEncrypt(const unsigned int [], int, const unsigned char [], |

[PATCH 14/14] swiotlb: remove swiotlb_nr_tbl

2021-02-28 Thread Christoph Hellwig
All callers just use it to check if swiotlb is active at all, for which they can just use is_swiotlb_active. In the longer run drivers need to stop using is_swiotlb_active as well, but let's do the simple step first. Signed-off-by: Christoph Hellwig --- drivers/gpu/drm/i915/gem/i915_gem_interna

[PATCH 13/14] swiotlb: dynamically allocate io_tlb_default_mem

2021-02-28 Thread Christoph Hellwig
Instead of allocating ->list and ->orig_addr separately just do one dynamic allocation for the actual io_tlb_mem structure. This simplifies a lot of the initialization code, and also allows to just check io_tlb_default_mem to see if swiotlb is in use. Signed-off-by: Christoph Hellwig --- driver

[PATCH 12/14] swiotlb: move global variables into a new io_tlb_mem structure

2021-02-28 Thread Christoph Hellwig
From: Claire Chang Added a new struct, io_tlb_mem, as the IO TLB memory pool descriptor and moved relevant global variables into that struct. This will be useful later to allow for restricted DMA pool. Signed-off-by: Claire Chang [hch: rebased] Signed-off-by: Christoph Hellwig --- drivers/xen

[PATCH 11/14] xen-swiotlb: remove the unused size argument from xen_swiotlb_fixup

2021-02-28 Thread Christoph Hellwig
Signed-off-by: Christoph Hellwig --- drivers/xen/swiotlb-xen.c | 7 +++ 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c index 00adeb95ebb9df..4ecfce2c6f7263 100644 --- a/drivers/xen/swiotlb-xen.c +++ b/drivers/xen/swiotlb-xen

[PATCH 10/14] xen-swiotlb: split xen_swiotlb_init

2021-02-28 Thread Christoph Hellwig
Split xen_swiotlb_init into a normal an an early case. That makes both much simpler and more readable, and also allows marking the early code as __init and x86-only. Signed-off-by: Christoph Hellwig --- arch/arm/xen/mm.c | 2 +- arch/x86/xen/pci-swiotlb-xen.c | 4 +- drivers/xe

[PATCH 08/14] xen-swiotlb: remove xen_io_tlb_start and xen_io_tlb_nslabs

2021-02-28 Thread Christoph Hellwig
The xen_io_tlb_start and xen_io_tlb_nslabs variables ar now only used in xen_swiotlb_init, so replace them with local variables. Signed-off-by: Christoph Hellwig --- drivers/xen/swiotlb-xen.c | 57 +-- 1 file changed, 25 insertions(+), 32 deletions(-) diff --

[PATCH 09/14] swiotlb: lift the double initialization protection from xen-swiotlb

2021-02-28 Thread Christoph Hellwig
Lift the double initialization protection from xen-swiotlb to the core code to avoid exposing too many swiotlb internals. Also upgrade the check to a warning as it should not happen. Signed-off-by: Christoph Hellwig --- drivers/xen/swiotlb-xen.c | 7 --- kernel/dma/swiotlb.c | 8 ++

[PATCH 06/14] xen-swiotlb: use io_tlb_end in xen_swiotlb_dma_supported

2021-02-28 Thread Christoph Hellwig
Use the existing variable that holds the physical address for xen_io_tlb_end to simplify xen_swiotlb_dma_supported a bit, and remove the otherwise unused xen_io_tlb_end variable and the xen_virt_to_bus helper. Signed-off-by: Christoph Hellwig Reviewed-by: Konrad Rzeszutek Wilk --- drivers/xen/s

[PATCH 07/14] xen-swiotlb: remove xen_set_nslabs

2021-02-28 Thread Christoph Hellwig
The xen_set_nslabs function is a little weird, as it has just one caller, that caller passes a global variable as the argument, which is then overriden in the function and a derivative of it returned. Just add a cpp symbol for the default size using a readable constant and open code the remaining

[PATCH 05/14] xen-swiotlb: use is_swiotlb_buffer in is_xen_swiotlb_buffer

2021-02-28 Thread Christoph Hellwig
Use the is_swiotlb_buffer to check if a physical address is a swiotlb buffer. This works because xen-swiotlb does use the same buffer as the main swiotlb code, and xen_io_tlb_{start,end} are just the addresses for it that went through phys_to_virt. Signed-off-by: Christoph Hellwig Reviewed-by: K

[PATCH 04/14] swiotlb: split swiotlb_tbl_sync_single

2021-02-28 Thread Christoph Hellwig
Split swiotlb_tbl_sync_single into two separate funtions for the to device and to cpu synchronization. Signed-off-by: Christoph Hellwig --- drivers/iommu/dma-iommu.c | 12 ++-- drivers/xen/swiotlb-xen.c | 4 ++-- include/linux/swiotlb.h | 17 - kernel/dma/direct.c

[PATCH 03/14] swiotlb: move orig addr and size validation into swiotlb_bounce

2021-02-28 Thread Christoph Hellwig
Move the code to find and validate the original buffer address and size from the callers into swiotlb_bounce. This means a tiny bit of extra work in the swiotlb_map path, but avoids code duplication and a leads to a better code structure. Signed-off-by: Christoph Hellwig --- kernel/dma/swiotlb.

[PATCH 02/14] swiotlb: remove the alloc_size parameter to swiotlb_tbl_unmap_single

2021-02-28 Thread Christoph Hellwig
Now that swiotlb remembers the allocation size there is no need to pass it back to swiotlb_tbl_unmap_single. Signed-off-by: Christoph Hellwig --- drivers/iommu/dma-iommu.c | 11 +++--- drivers/xen/swiotlb-xen.c | 4 ++-- include/linux/swiotlb.h | 1 - kernel/dma/direct.h | 2 +- k

[PATCH 01/14] powerpc/svm: stop using io_tlb_start

2021-02-28 Thread Christoph Hellwig
Use the local variable that is passed to swiotlb_init_with_tbl for freeing the memory in the failure case to isolate the code a little better from swiotlb internals. Signed-off-by: Christoph Hellwig --- arch/powerpc/platforms/pseries/svm.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions

swiotlb cleanups v2

2021-02-28 Thread Christoph Hellwig
Hi Konrad, this series contains a bunch of swiotlb cleanups, mostly to reduce the amount of internals exposed to code outside of swiotlb.c, which should helper to prepare for supporting multiple different bounce buffer pools. Changes since v1: - rebased to v5.12-rc1 - a few more cleanups - mer

Re: [PATCH] drm/xen: adjust Kconfig

2021-02-28 Thread Oleksandr Andrushchenko
On 2/24/21 6:17 PM, Daniel Vetter wrote: > On Wed, Feb 24, 2021 at 8:55 AM Oleksandr Andrushchenko > wrote: >> Hello, Jan! >> >> On 2/23/21 6:41 PM, Jan Beulich wrote: >>> By having selected DRM_XEN, I was assuming I would build the frontend >>> driver. As it turns out this is a dummy option, and

[linux-linus test] 159786: regressions - FAIL

2021-02-28 Thread osstest service owner
flight 159786 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/159786/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-xsm7 xen-install fail REGR. vs. 152332 test-amd64-i386-xl-

RE: [PATCH for-4.15 v5 3/3] xen/iommu: x86: Clear the root page-table before freeing the page-tables

2021-02-28 Thread Tian, Kevin
> From: Julien Grall > Sent: Friday, February 26, 2021 6:57 PM > > From: Julien Grall > > The new per-domain IOMMU page-table allocator will now free the > page-tables when domain's resources are relinquished. However, the > per-domain IOMMU structure will still contain a dangling pointer to >

RE: [PATCH for-4.15 v5 2/3] xen/x86: iommu: Ignore IOMMU mapping requests when a domain is dying

2021-02-28 Thread Tian, Kevin
> From: Julien Grall > Sent: Friday, February 26, 2021 6:57 PM > > From: Julien Grall > > The new x86 IOMMU page-tables allocator will release the pages when > relinquishing the domain resources. However, this is not sufficient > when the domain is dying because nothing prevents page-table to b

RE: [PATCH v3 2/2] VMX: use a single, global APIC access page

2021-02-28 Thread Tian, Kevin
> From: Jan Beulich > Sent: Monday, February 22, 2021 6:57 PM > > The address of this page is used by the CPU only to recognize when to > access the virtual APIC page instead. No accesses would ever go to this > page. It only needs to be present in the (CPU) page tables so that > address translat

RE: [PATCH] VMX: use a single, global APIC access page

2021-02-28 Thread Tian, Kevin
> From: Roger Pau Monné > Sent: Thursday, February 11, 2021 8:27 PM > > On Thu, Feb 11, 2021 at 12:22:41PM +0100, Jan Beulich wrote: > > On 11.02.2021 12:16, Roger Pau Monné wrote: > > > On Thu, Feb 11, 2021 at 11:36:59AM +0100, Jan Beulich wrote: > > >> On 11.02.2021 09:45, Roger Pau Monné wrote

RE: [PATCH] VMX: use a single, global APIC access page

2021-02-28 Thread Tian, Kevin
> From: Jan Beulich > Sent: Thursday, February 11, 2021 1:04 AM > > On 10.02.2021 18:00, Andrew Cooper wrote: > > On 10/02/2021 16:48, Jan Beulich wrote: > >> The address of this page is used by the CPU only to recognize when to > >> instead access the virtual APIC page instead. No accesses would

[qemu-mainline test] 159785: regressions - FAIL

2021-02-28 Thread osstest service owner
flight 159785 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/159785/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt-vhd 19 guest-start/debian.repeat fail REGR. vs. 152631 test-amd64-amd64

[linux-linus test] 159781: regressions - FAIL

2021-02-28 Thread osstest service owner
flight 159781 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/159781/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-xsm7 xen-install fail REGR. vs. 152332 test-amd64-i386-xl-

[qemu-mainline test] 159780: regressions - FAIL

2021-02-28 Thread osstest service owner
flight 159780 qemu-mainline real [real] flight 159784 qemu-mainline real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/159780/ http://logs.test-lab.xenproject.org/osstest/logs/159784/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be

[xen-unstable test] 159779: tolerable FAIL

2021-02-28 Thread osstest service owner
flight 159779 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/159779/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 159726 test-armhf-armhf-libvirt 16 save

[libvirt test] 159782: regressions - FAIL

2021-02-28 Thread osstest service owner
flight 159782 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/159782/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 6 libvirt-buildfail REGR. vs. 151777 build-amd64-libvirt

[xen-unstable-coverity test] 159783: all pass - PUSHED

2021-02-28 Thread osstest service owner
flight 159783 xen-unstable-coverity real [real] http://logs.test-lab.xenproject.org/osstest/logs/159783/ Perfect :-) All tests in this flight passed as required version targeted for testing: xen c4441ab1f1d506a942002ccc55fdde2fe30ef626 baseline version: xen 5d94