[qemu-mainline test] 161554: regressions - FAIL

2021-04-30 Thread osstest service owner
flight 161554 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/161554/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-freebsd11-amd64 16 guest-saverestore fail REGR. vs. 152631 test-amd64-i3

[ovmf test] 161559: all pass - PUSHED

2021-04-30 Thread osstest service owner
flight 161559 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/161559/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 1e6b0394d6c001802dc454ecff19076aaa80f51c baseline version: ovmf ab957f036f67118692832

[xen-unstable test] 161551: tolerable FAIL - PUSHED

2021-04-30 Thread osstest service owner
flight 161551 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/161551/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 161534 test-armhf-armhf-libvirt 16 save

[linux-linus test] 161549: regressions - FAIL

2021-04-30 Thread osstest service owner
flight 161549 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/161549/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-intel 7 xen-install fail REGR. vs. 152332 test-amd64-i386-xl-

[xen-unstable-smoke test] 161556: tolerable all pass - PUSHED

2021-04-30 Thread osstest service owner
flight 161556 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/161556/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [PATCH 1/5] tools/debugger: Fix PAGE_SIZE redefinition error

2021-04-30 Thread Costin Lupu
On 4/30/21 9:45 PM, Tim Deegan wrote: > At 14:36 +0300 on 30 Apr (1619793419), Costin Lupu wrote: >> Hi Tim, >> >> On 4/29/21 10:58 PM, Tim Deegan wrote: >>> Hi, >>> >>> At 15:05 +0300 on 27 Apr (1619535916), Costin Lupu wrote: If PAGE_SIZE is already defined in the system (e.g. in /usr/i

Re: [RFC PATCH] iommu: make no-quarantine mean no-quarantine

2021-04-30 Thread Scott Davis
On 4/30/21, 3:15 AM, Jan Beulich wrote: > So far you didn't tell us what the actual crash was. I guess it's not > even clear to me whether it's Xen or qemu that did crash for you. But > I have to also admit that until now it wasn't really clear to me that > you ran Xen _under_ qemu - instead I was

[xen-4.12-testing test] 161545: regressions - FAIL

2021-04-30 Thread osstest service owner
flight 161545 xen-4.12-testing real [real] flight 161557 xen-4.12-testing real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/161545/ http://logs.test-lab.xenproject.org/osstest/logs/161557/ Regressions :-( Tests which did not succeed and are blocking, including tests which could

Re: [PATCH 1/5] tools/debugger: Fix PAGE_SIZE redefinition error

2021-04-30 Thread Tim Deegan
At 14:36 +0300 on 30 Apr (1619793419), Costin Lupu wrote: > Hi Tim, > > On 4/29/21 10:58 PM, Tim Deegan wrote: > > Hi, > > > > At 15:05 +0300 on 27 Apr (1619535916), Costin Lupu wrote: > >> If PAGE_SIZE is already defined in the system (e.g. in > >> /usr/include/limits.h header) then gcc will tri

[PATCH] xen: Free xenforeignmemory_resource at exit

2021-04-30 Thread Anthony PERARD
From: Anthony PERARD Because Coverity complains about it and this is one leak that Valgrind reports. Signed-off-by: Anthony PERARD --- hw/i386/xen/xen-hvm.c | 9 ++--- include/hw/xen/xen_common.h | 6 ++ 2 files changed, 12 insertions(+), 3 deletions(-) diff --git a/hw/i386/xen/

[PATCH] xen-block: Use specific blockdev driver

2021-04-30 Thread Anthony PERARD
From: Anthony PERARD ... when a xen-block backend instance is created via xenstore. Following 8d17adf34f50 ("block: remove support for using "file" driver with block/char devices"), using the "file" blockdev driver for everything doesn't work anymore, we need to use the "host_device" driver when

[qemu-mainline test] 161540: regressions - FAIL

2021-04-30 Thread osstest service owner
flight 161540 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/161540/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-freebsd11-amd64 16 guest-saverestore fail REGR. vs. 152631 test-amd64-i3

Re: [PATCH] x86: Always have CR4.PKE set in HVM context

2021-04-30 Thread Jan Beulich
On 30.04.2021 16:37, Andrew Cooper wrote: > On 30/04/2021 11:42, Jan Beulich wrote: >> On 30.04.2021 12:21, Andrew Cooper wrote: >>> If I do the rebase, are you happy for this patch to stay as it is (so >>> the complicated change concerning context switching doesn't get more >>> complicated), and s

[PATCH v3 13/13] libs/guest: (re)move xc_cpu_policy_apply_cpuid

2021-04-30 Thread Roger Pau Monne
Move the logic from xc_cpu_policy_apply_cpuid into libxl, now that the xc_cpu_policy_* helpers allow modifying a cpu policy. By moving such parsing into libxl directly we can get rid of xc_xend_cpuid, as libxl will now implement it's own private type for storing CPUID information, which currently m

[PATCH v3 12/13] libs/{light,guest}: implement xc_cpuid_apply_policy in libxl

2021-04-30 Thread Roger Pau Monne
With the addition of the xc_cpu_policy_* now libxl can have better control over the cpu policy, this allows removing the xc_cpuid_apply_policy function and instead coding the required bits by libxl in libxl__cpuid_legacy directly. Remove xc_cpuid_apply_policy. Signed-off-by: Roger Pau Monné ---

[PATCH v3 11/13] libs/guest: apply a featureset into a cpu policy

2021-04-30 Thread Roger Pau Monne
Pull out the code from xc_cpuid_apply_policy that applies a featureset to a cpu policy and place it on it's own standalone function that's part of the public interface. No functional change intended. Signed-off-by: Roger Pau Monné --- tools/include/xenctrl.h | 5 ++ tools/libs/guest/xg

[PATCH v3 10/13] libs/guest: rework xc_cpuid_xend_policy

2021-04-30 Thread Roger Pau Monne
Rename xc_cpuid_xend_policy to xc_cpu_policy_apply_cpuid and make it public. Modify the function internally to use the new xc_cpu_policy_* set of functions. Also don't apply the passed policy to a domain directly, and instead modify the provided xc_cpu_policy_t. The caller will be responsible of ap

[PATCH v3 09/13] libs/guest: introduce helper set cpu topology in cpu policy

2021-04-30 Thread Roger Pau Monne
This logic is pulled out from xc_cpuid_apply_policy and placed into a separate helper. Note the legacy part of the introduced function, as long term Xen will require a proper topology setter function capable of expressing a more diverse set of topologies. No functional change intended. Signed-off

[PATCH v3 08/13] libs/guest: make a cpu policy compatible with older Xen versions

2021-04-30 Thread Roger Pau Monne
Older Xen versions used to expose some CPUID bits which are no longer exposed by default. In order to keep a compatible behavior with guests migrated from versions of Xen that don't encode the CPUID data on the migration stream introduce a function that sets the same bits as older Xen versions. Th

[PATCH v3 07/13] libs/guest: obtain a compatible cpu policy from two input ones

2021-04-30 Thread Roger Pau Monne
Introduce a helper to obtain a compatible cpu policy based on two input cpu policies. Currently this is done by and'ing all CPUID feature leaves and MSR entries, except for MSR_ARCH_CAPABILITIES which has the RSBA bit or'ed. The _AC macro is pulled from libxl_internal.h into xen-tools/libs.h since

[PATCH v3 06/13] libs/guest: introduce helper to check cpu policy compatibility

2021-04-30 Thread Roger Pau Monne
Such helpers is just a wrapper to the existing x86_cpu_policies_are_compatible function. This requires building policy.c from libx86 on user land also. No user of the interface introduced. Signed-off-by: Roger Pau Monné --- Changes since v1: - Initialize err. - Explicitly name parameters as ho

[PATCH v3 05/13] libs/guest: allow updating a cpu policy MSR data

2021-04-30 Thread Roger Pau Monne
Introduce a helper to update the MSR policy using an array of xen_msr_entry_t entries. Note the MSRs present in the input xen_msr_entry_t array will replace any existing entries on the policy. No user of the interface introduced on this patch. Signed-off-by: Roger Pau Monné --- Changes since v1:

[PATCH v3 04/13] libs/guest: allow updating a cpu policy CPUID data

2021-04-30 Thread Roger Pau Monne
Introduce a helper to update the CPUID policy using an array of xen_cpuid_leaf_t entries. Note the leaves present in the input xen_cpuid_leaf_t array will replace any existing leaves on the policy. No user of the interface introduced on this patch. Signed-off-by: Roger Pau Monné --- Changes sinc

[PATCH v3 03/13] libs/guest: allow fetching a specific MSR entry from a cpu policy

2021-04-30 Thread Roger Pau Monne
Introduce an interface that returns a specific MSR entry from a cpu policy in xen_msr_entry_t format. Provide a helper to perform a binary search against an array of MSR entries. This is useful to callers can peek data from the opaque xc_cpu_policy_t type. No caller of the interface introduced on

[PATCH v3 02/13] libs/guest: allow fetching a specific CPUID leaf from a cpu policy

2021-04-30 Thread Roger Pau Monne
Introduce an interface that returns a specific leaf/subleaf from a cpu policy in xen_cpuid_leaf_t format. This is useful to callers can peek data from the opaque xc_cpu_policy_t type. No caller of the interface introduced on this patch. Note that callers of find_leaf need to be slightly adjusted

[PATCH v3 01/13] libxl: don't ignore the return value from xc_cpuid_apply_policy

2021-04-30 Thread Roger Pau Monne
Also change libxl__cpuid_legacy to propagate the error from xc_cpuid_apply_policy into callers. Signed-off-by: Roger Pau Monné Reviewed-by: Jan Beulich --- Changes since v2: - Use 'r' for xc_cpuid_apply_policy return value. - Use LOGEVD to print error message. Changes since v1: - Return ERRO

[PATCH v3 00/13] libs/guest: new CPUID/MSR interface

2021-04-30 Thread Roger Pau Monne
Hello, The following series introduces a new CPUID/MSR interface for the xenguest library. Such interface handles both CPUID and MSRs using the same opaque object, and provides some helpers for the user to peek or modify such data without exposing the backing type. This is useful for future develo

Re: [PATCH 1/3] x86/hvm: Introduce experimental guest CET support

2021-04-30 Thread Andrew Cooper
On 29/04/2021 10:07, Jan Beulich wrote: > On 28.04.2021 19:54, Andrew Cooper wrote: >> I know we're making up our "how to do complicated experimental features" >> process as we go here, but nothing *in Xen* will malfunction if a user >> opts into CET_SS/IBT.  Therefore I think they're fine to go in

[PATCH 3/3] firmware/shim: UNSUPPORTED=n

2021-04-30 Thread Jan Beulich
We shouldn't default to include any unsupported code in the shim. Mark the setting as off, replacing the ARGO specification. This points out anomalies with the scheduler configuration: Unsupported schedulers better don't default to Y in release builds (like is already the case for ARINC653). Withou

[PATCH 2/3] firmware/shim: drop XEN_CONFIG_EXPERT uses

2021-04-30 Thread Jan Beulich
As of commit d155e4aef35c ("xen: Allow EXPERT mode to be selected from the menuconfig directly") EXPERT is a regular config option. Signed-off-by: Jan Beulich --- a/tools/firmware/xen-dir/Makefile +++ b/tools/firmware/xen-dir/Makefile @@ -74,10 +74,10 @@ $(D): linkfarm.stamp $(MAKE) -C $

[PATCH 1/3] firmware/shim: update linkfarm exclusions

2021-04-30 Thread Jan Beulich
Some intermediate files weren't considered at all at the time. Also after its introduction, various changes to the build environment have rendered the exclusion sets stale. For example, we now have some .*.cmd files in the build tree. Combine all respective patterns into a single .* one, seeing th

[PATCH 0/3] firmware/shim: build adjustments

2021-04-30 Thread Jan Beulich
Originally I meant to finally get v2 of "firmware/shim: honor symlinks during Xen tree setup" sorted. However, the suggestion to use find's -L option, while a suitable equivalent of the -xtype primary, has the same drawback: It doesn't distinguish between relative and absolute symlinks (and we spec

Re: [PATCH v2 09/12] x86: make mem-paging configuarable and default it to off for being unsupported

2021-04-30 Thread Roger Pau Monné
On Fri, Apr 30, 2021 at 04:16:24PM +0200, Jan Beulich wrote: > On 30.04.2021 11:55, Roger Pau Monné wrote: > > On Mon, Apr 12, 2021 at 04:12:41PM +0200, Jan Beulich wrote: > >> --- a/xen/arch/x86/x86_64/compat/mm.c > >> +++ b/xen/arch/x86/x86_64/compat/mm.c > >> @@ -155,8 +155,10 @@ int compat_arch

Re: [PATCH] x86: Always have CR4.PKE set in HVM context

2021-04-30 Thread Andrew Cooper
On 30/04/2021 11:42, Jan Beulich wrote: > On 30.04.2021 12:21, Andrew Cooper wrote: >> On 30/04/2021 10:08, Jan Beulich wrote: >>> On 30.04.2021 00:12, Andrew Cooper wrote: The sole user of read_pkru() is the emulated pagewalk, and guarded behind guest_pku_enabled() which restricts the pa

Re: [PATCH v2 09/12] x86: make mem-paging configuarable and default it to off for being unsupported

2021-04-30 Thread Jan Beulich
On 30.04.2021 11:55, Roger Pau Monné wrote: > On Mon, Apr 12, 2021 at 04:12:41PM +0200, Jan Beulich wrote: >> --- a/xen/arch/x86/x86_64/compat/mm.c >> +++ b/xen/arch/x86/x86_64/compat/mm.c >> @@ -155,8 +155,10 @@ int compat_arch_memory_op(unsigned long >> case XENMEM_get_sharing_shared_pages:

Re: Xen Virtual Keyboard modalias breaking uevents

2021-04-30 Thread Phillip Susi
Dmitry Torokhov writes: > I don't know why Xen keyboard exports that many keycodes ;) In general, > my recommendation is to mirror the physical device when possible, and > instantiate several devices so there is 1:1 relationship between virtual > and physical devices. I'm still trying to wrap m

Re: [PATCH 1/4] x86/xen/entry: Rename xenpv_exc_nmi to noist_exc_nmi

2021-04-30 Thread Steven Rostedt
On Fri, 30 Apr 2021 09:15:51 +0200 Paolo Bonzini wrote: > > Nit, but in change logs, please avoid stating "next patch" as searching git > > history (via git blame or whatever) there is no such thing as "next patch". > > > > Interesting, I use next patch(es) relatively often, though you're rig

[xen-unstable test] 161534: tolerable FAIL

2021-04-30 Thread osstest service owner
flight 161534 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/161534/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-xtf-amd64-amd64-3 92 xtf/test-pv32pae-xsa-286 fail in 161512 pass in 161534 test-amd64-amd64-xl-qemuu-deb

Re: [PATCH 1/5] tools/debugger: Fix PAGE_SIZE redefinition error

2021-04-30 Thread Costin Lupu
Hi Tim, On 4/29/21 10:58 PM, Tim Deegan wrote: > Hi, > > At 15:05 +0300 on 27 Apr (1619535916), Costin Lupu wrote: >> If PAGE_SIZE is already defined in the system (e.g. in >> /usr/include/limits.h header) then gcc will trigger a redefinition error >> because of -Werror. This commit also protects

Re: [PATCH v2 5/5] tools/ocaml: Fix redefinition errors

2021-04-30 Thread Costin Lupu
@Christian: This version is slightly changed, it uses XC_PAGE_* macros instead of PAGE_* macros and that's why I didn't add your ack. Cheers, Costin On 4/30/21 2:28 PM, Costin Lupu wrote: > If PAGE_SIZE is already defined in the system (e.g. in /usr/include/limits.h > header) then gcc will trigge

[PATCH v2 3/5] tools/libs/foreignmemory: Fix PAGE_SIZE redefinition error

2021-04-30 Thread Costin Lupu
If PAGE_SIZE is already defined in the system (e.g. in /usr/include/limits.h header) then gcc will trigger a redefinition error because of -Werror. This patch replaces usage of PAGE_* macros with XC_PAGE_* macros in order to avoid confusion between control domain page granularity (PAGE_* definition

[PATCH v2 5/5] tools/ocaml: Fix redefinition errors

2021-04-30 Thread Costin Lupu
If PAGE_SIZE is already defined in the system (e.g. in /usr/include/limits.h header) then gcc will trigger a redefinition error because of -Werror. This patch replaces usage of PAGE_* macros with XC_PAGE_* macros in order to avoid confusion between control domain page granularity (PAGE_* definition

[PATCH v2 4/5] tools/libs/gnttab: Fix PAGE_SIZE redefinition error

2021-04-30 Thread Costin Lupu
If PAGE_SIZE is already defined in the system (e.g. in /usr/include/limits.h header) then gcc will trigger a redefinition error because of -Werror. This patch replaces usage of PAGE_* macros with XC_PAGE_* macros in order to avoid confusion between control domain page granularity (PAGE_* definition

[PATCH v2 1/5] tools/debugger: Fix PAGE_SIZE redefinition error

2021-04-30 Thread Costin Lupu
If PAGE_SIZE is already defined in the system (e.g. in /usr/include/limits.h header) then gcc will trigger a redefinition error because of -Werror. This patch replaces usage of PAGE_* macros with XC_PAGE_* macros in order to avoid confusion between control domain page granularity (PAGE_* definition

[PATCH v2 0/5] Fix redefinition errors for toolstack libs

2021-04-30 Thread Costin Lupu
For replication I used gcc 10.3 on an Alpine system. In order to replicate the redefinition error for PAGE_SIZE one should install the 'fortify-headers' package which will change the chain of included headers by indirectly including /usr/include/limits.h where PAGE_SIZE and PATH_MAX are defined. C

[PATCH v2 2/5] tools/libfsimage: Fix PATH_MAX redefinition error

2021-04-30 Thread Costin Lupu
If PATH_MAX is already defined in the system (e.g. in /usr/include/limits.h header) then gcc will trigger a redefinition error because of -Werror. Signed-off-by: Costin Lupu Reviewed-by: Julien Grall --- tools/libfsimage/ext2fs/fsys_ext2fs.c | 2 ++ tools/libfsimage/reiserfs/fsys_reiserfs.c

Re: [PATCH v2 12/12] x86/p2m: re-arrange struct p2m_domain

2021-04-30 Thread Roger Pau Monné
On Mon, Apr 12, 2021 at 04:14:22PM +0200, Jan Beulich wrote: > Combine two HVM-specific sections in two cases (i.e. going from four of > them to just two). Make defer_nested_flush bool and HVM-only, moving it > next to other nested stuff. Move default_access up into a padding hole. > > When moving

Re: [PATCH v2 10/12] x86/p2m: {get,set}_entry hooks and p2m-pt.c are HVM-only

2021-04-30 Thread Roger Pau Monné
On Mon, Apr 12, 2021 at 04:13:19PM +0200, Jan Beulich wrote: > With the hooks no longer needing setting, p2m_pt_init() degenerates to > (about) nothing when !HVM. As a result, p2m-pt.c doesn't need building > anymore in this case, as long as p2m_pt_init() has proper surrogates put > in place. > >

Re: [PATCH] x86: Always have CR4.PKE set in HVM context

2021-04-30 Thread Jan Beulich
On 30.04.2021 12:21, Andrew Cooper wrote: > On 30/04/2021 10:08, Jan Beulich wrote: >> On 30.04.2021 00:12, Andrew Cooper wrote: >>> The sole user of read_pkru() is the emulated pagewalk, and guarded behind >>> guest_pku_enabled() which restricts the path to HVM (hap, even) context >>> only. >>> >

Re: [PATCH] x86: Always have CR4.PKE set in HVM context

2021-04-30 Thread Andrew Cooper
On 30/04/2021 10:08, Jan Beulich wrote: > On 30.04.2021 00:12, Andrew Cooper wrote: >> The sole user of read_pkru() is the emulated pagewalk, and guarded behind >> guest_pku_enabled() which restricts the path to HVM (hap, even) context only. >> >> The commentary in read_pkru() concerning _PAGE_GNTT

Re: [PATCH v2 09/12] x86: make mem-paging configuarable and default it to off for being unsupported

2021-04-30 Thread Roger Pau Monné
On Mon, Apr 12, 2021 at 04:12:41PM +0200, Jan Beulich wrote: > While doing so, make the option dependent upon HVM, which really is the > main purpose of the change. > > Signed-off-by: Jan Beulich > --- > v2: New. > > --- a/xen/arch/x86/Kconfig > +++ b/xen/arch/x86/Kconfig > @@ -15,7 +15,6 @@ con

[linux-linus test] 161524: regressions - FAIL

2021-04-30 Thread osstest service owner
flight 161524 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/161524/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-intel 7 xen-install fail REGR. vs. 152332 test-amd64-i386-xl-

Re: [PATCH v2 07/12] x86/p2m: the recalc hook is HVM-only

2021-04-30 Thread Roger Pau Monné
On Mon, Apr 12, 2021 at 04:09:18PM +0200, Jan Beulich wrote: > Exclude functions involved in its use from !HVM builds, thus making it > possible to exclude the hook as well. > > Signed-off-by: Jan Beulich Acked-by: Roger Pau Monné Thanks, Roger.

[qemu-mainline bisection] complete test-amd64-i386-xl-qemuu-win7-amd64

2021-04-30 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-i386-xl-qemuu-win7-amd64 testid guest-saverestore Tree: linux git://xenbits.xen.org/linux-pvops.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git Tree: qemu git://xenb

Re: [PATCH] x86: Always have CR4.PKE set in HVM context

2021-04-30 Thread Jan Beulich
On 30.04.2021 00:12, Andrew Cooper wrote: > The sole user of read_pkru() is the emulated pagewalk, and guarded behind > guest_pku_enabled() which restricts the path to HVM (hap, even) context only. > > The commentary in read_pkru() concerning _PAGE_GNTTAB overlapping with > _PAGE_PKEY_BITS is only

Re: [PATCH] public/gnttab: relax v2 recommendation

2021-04-30 Thread Jan Beulich
On 30.04.2021 10:19, Julien Grall wrote: > On 29/04/2021 14:10, Jan Beulich wrote: >> With there being a way to disable v2 support, telling new guests to use >> v2 exclusively is not a good suggestion. >> >> Signed-off-by: Jan Beulich >> >> --- a/xen/include/public/grant_table.h >> +++ b/xen/inclu

Re: [PATCH] public/gnttab: relax v2 recommendation

2021-04-30 Thread Julien Grall
Hi Jan, On 29/04/2021 14:10, Jan Beulich wrote: With there being a way to disable v2 support, telling new guests to use v2 exclusively is not a good suggestion. Signed-off-by: Jan Beulich --- a/xen/include/public/grant_table.h +++ b/xen/include/public/grant_table.h @@ -121,8 +121,10 @@ typede

Re: [PATCH v3] gnttab: defer allocation of status frame tracking array

2021-04-30 Thread Julien Grall
Hi Jan, On 29/04/2021 14:40, Jan Beulich wrote: On 29.04.2021 15:15, Julien Grall wrote: On 15/04/2021 10:41, Jan Beulich wrote: This array can be large when many grant frames are permitted; avoid allocating it when it's not going to be used anyway, by doing this only in gnttab_populate_status

[ANNOUNCE] Call for agenda items for 6 May Community Call @ 1500 UTC

2021-04-30 Thread George Dunlap
Hi all, The proposed agenda is in https://cryptpad.fr/pad/#/2/pad/edit/o-pGdfLGjXG8Bui-Cu+iJLsC/ and you can edit to add items. Alternatively, you can reply to this mail directly. Agenda items appreciated a few days before the call: please put your name besides items if you edit the document.

Re: [PATCH] public/gnttab: relax v2 recommendation

2021-04-30 Thread Luca Fancellu
> On 29 Apr 2021, at 14:10, Jan Beulich wrote: > > With there being a way to disable v2 support, telling new guests to use > v2 exclusively is not a good suggestion. > > Signed-off-by: Jan Beulich > > --- a/xen/include/public/grant_table.h > +++ b/xen/include/public/grant_table.h > @@ -121,

[libvirt test] 161542: regressions - FAIL

2021-04-30 Thread osstest service owner
flight 161542 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/161542/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 6 libvirt-buildfail REGR. vs. 151777 build-amd64-libvirt

Re: [PATCH 1/4] x86/xen/entry: Rename xenpv_exc_nmi to noist_exc_nmi

2021-04-30 Thread Paolo Bonzini
On 28/04/21 23:27, Steven Rostedt wrote: On Tue, 27 Apr 2021 07:09:46 +0800 Lai Jiangshan wrote: From: Lai Jiangshan There is no any functionality change intended. Just rename it and move it to arch/x86/kernel/nmi.c so that we can resue it later in next patch for early NMI and kvm. Nit, b

Re: [RFC PATCH] iommu: make no-quarantine mean no-quarantine

2021-04-30 Thread Jan Beulich
On 29.04.2021 23:04, Scott Davis wrote: > On 4/28/21, 3:20 AM, Paul Durrant wrote: >>> Following the extension to the command line option I'm putting in place >>> in "IOMMU: make DMA containment of quarantined devices optional" (which >>> I still need to get around to address review feedback for an