[PATCH] kexec-xen: Use correct image type for Live Update

2021-03-23 Thread Raphael Ning
From: Raphael Ning Unlike xen_kexec_load(), xen_kexec_unload() and xen_kexec_status() fail to distinguish between normal kexec and Xen Live Update image types. Fix that by introducing a new helper function that maps internal flags to KEXEC_TYPE_*, and using it throughout kexec-xen.c.

[linux-linus test] 160353: regressions - FAIL

2021-03-23 Thread osstest service owner
flight 160353 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/160353/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-debianhvm-amd64 7 xen-install fail REGR. vs. 152332

[qemu-mainline bisection] complete test-amd64-i386-freebsd10-i386

2021-03-23 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-i386-freebsd10-i386 testid guest-saverestore Tree: linux git://xenbits.xen.org/linux-pvops.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git Tree: qemu

[xen-unstable test] 160348: tolerable FAIL - PUSHED

2021-03-23 Thread osstest service owner
flight 160348 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/160348/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-rtds18 guest-start/debian.repeat fail REGR. vs. 160296 Tests which did not

[ovmf test] 160352: all pass - PUSHED

2021-03-23 Thread osstest service owner
flight 160352 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/160352/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 0ecdcb6142037dd1cdd08660a2349960bcf0270a baseline version: ovmf

Re: Working Group Meeting for hyperlaunch

2021-03-23 Thread Christopher Clark
On Thu, Mar 18, 2021 at 8:33 AM Daniel P. Smith wrote: > > On 3/16/21 12:09 AM, Daniel P. Smith wrote: > > All, > > > > We have posted[1][2] the design documents for hyperlaunch and would > > invite attendance at a working group call to discuss two agenda items. > > The first item is a review of

Re: xen/evtchn: Dom0 boot hangs using preempt_rt kernel 5.10

2021-03-23 Thread Julien Grall
On 23/03/2021 19:26, Julien Grall wrote: On 23/03/2021 17:06, Luca Fancellu wrote: Hi all, Hi, Please avoid top posting when answering to a comment. This makes more difficult to follow. I have an update, changing the lock introduced by the serie from spinlock_t to raw_spinlock_t,

[xen-4.12-testing test] 160344: regressions - FAIL

2021-03-23 Thread osstest service owner
flight 160344 xen-4.12-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/160344/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qcow219 guest-localmigrate/x10 fail REGR. vs. 159418

[xen-unstable-smoke test] 160366: tolerable all pass - PUSHED

2021-03-23 Thread osstest service owner
flight 160366 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/160366/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

Re: xen/evtchn: Dom0 boot hangs using preempt_rt kernel 5.10

2021-03-23 Thread Julien Grall
On 23/03/2021 17:06, Luca Fancellu wrote: Hi all, Hi, Please avoid top posting when answering to a comment. This makes more difficult to follow. I have an update, changing the lock introduced by the serie from spinlock_t to raw_spinlock_t, changing the lock/unlock function to use the

[libvirt test] 160350: regressions - FAIL

2021-03-23 Thread osstest service owner
flight 160350 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/160350/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 151777 build-armhf-libvirt

Re: [PATCH 1/2] docs/designs/launch: hyperlaunch design document

2021-03-23 Thread Christopher Clark
On Thu, Mar 18, 2021 at 9:43 AM Roger Pau Monné wrote: > > Just took a quick look at it. > > On Mon, Mar 15, 2021 at 11:18:13PM -0400, Daniel P. Smith wrote: > > + > > +---+---++---+-+-+ > > + | **Xen Dom0** | **Linux** |

Re: [PATCH] xen: Create EFI_VENDOR directory

2021-03-23 Thread Roman Shaposhnik
On Tue, Mar 23, 2021 at 8:59 AM Michael Young wrote: > > > On Tue, 23 Mar 2021, Ian Jackson wrote: > > > Jan Beulich writes ("Re: [PATCH] xen: Create EFI_VENDOR directory"): > >> On 23.03.2021 13:34, Jason Andryuk wrote: > > ... > >>> On Fedora, RPMs drop EFI binaries directly into

Re: [PATCH] xen: Create EFI_VENDOR directory

2021-03-23 Thread Roman Shaposhnik
On Tue, Mar 23, 2021 at 6:36 AM Jan Beulich wrote: > On 23.03.2021 13:34, Jason Andryuk wrote: > > On Tue, Mar 23, 2021 at 3:23 AM Jan Beulich wrote: > >> > >> On 22.03.2021 18:08, Andrew Cooper wrote: > >>> On 22/03/2021 15:15, Jan Beulich wrote: > On 22.03.2021 15:59, Andrew Cooper

Re: [ANNOUNCE] Xen 4.15 - release status, branching tomorrow

2021-03-23 Thread Ian Jackson
Jan Beulich writes ("Re: [ANNOUNCE] Xen 4.15 - release status, branching tomorrow"): > On 23.03.2021 17:53, Ian Jackson wrote: > >> One option of course is, like was just done for 4.13.3, to revert. > >> Iirc Andrew had some thoughts towards making the new piece of code > >> conditional upon the

Re: xen/evtchn: Dom0 boot hangs using preempt_rt kernel 5.10

2021-03-23 Thread Luca Fancellu
Hi all, I have an update, changing the lock introduced by the serie from spinlock_t to raw_spinlock_t, changing the lock/unlock function to use the raw_* version and keeping the BUG_ON(…) (now we can because raw_* implementation disable interrupts on preempt_rt) the kernel is booting

Re: [ANNOUNCE] Xen 4.15 - release status, branching tomorrow

2021-03-23 Thread Jan Beulich
On 23.03.2021 17:53, Ian Jackson wrote: > Jan Beulich writes ("Re: [ANNOUNCE] Xen 4.15 - release status, branching > tomorrow"): >> On 23.03.2021 16:17, Ian Jackson wrote: >>> I think it may be time to reconcile ourselves to not fixing this, >>> and deciding on a suitable plan B. Do we need

Re: [ANNOUNCE] Xen 4.15 - release status, branching tomorrow

2021-03-23 Thread Ian Jackson
Jan Beulich writes ("Re: [ANNOUNCE] Xen 4.15 - release status, branching tomorrow"): > On 23.03.2021 16:17, Ian Jackson wrote: > > I think it may be time to reconcile ourselves to not fixing this, > > and deciding on a suitable plan B. Do we need to put something in > > the release notes,

Re: [ANNOUNCE] Xen 4.15 - release status, branching tomorrow

2021-03-23 Thread Jan Beulich
On 23.03.2021 16:17, Ian Jackson wrote: > I have reviewed my list of blockers and the conversation that followed > and there are just three areas that are still of concern to me: > > * io-apic issue on Ryzen 1800X > >Related Qubes issue tracking this: >

Re: [PATCH] xen: Create EFI_VENDOR directory

2021-03-23 Thread Michael Young
On Tue, 23 Mar 2021, Ian Jackson wrote: Jan Beulich writes ("Re: [PATCH] xen: Create EFI_VENDOR directory"): On 23.03.2021 13:34, Jason Andryuk wrote: ... On Fedora, RPMs drop EFI binaries directly into /boot/efi/EFI/fedora/. grub, shim, fwupdate and xen are all packaged that way. It

Re: xen/evtchn: Dom0 boot hangs using preempt_rt kernel 5.10

2021-03-23 Thread Luca Fancellu
Hi Jason, Thanks for your hints, unfortunately seems not an init problem because in the same init configuration I tried the 5.10.23 (preempt_rt) without the Juergen patch but with the BUG_ON removed and it boots without problem. So seems that applying the serie does something (on a preempt_rt

Re: [ANNOUNCE] Xen 4.15 - release status, branching tomorrow

2021-03-23 Thread Ian Jackson
(dropping Frédéric Pierret of Qubes, who was CC'd becausd of the Ryzen issue.) Roger Pau Monné writes ("Re: [ANNOUNCE] Xen 4.15 - release status, branching tomorrow"): > So there's also the series from Andrew to allow Solaris to boot > without resorting to use the 'msr_relaxed' option: > >

Re: [PATCH] xen: Create EFI_VENDOR directory

2021-03-23 Thread Jan Beulich
On 23.03.2021 14:41, Ian Jackson wrote: > Jan Beulich writes ("Re: [PATCH] xen: Create EFI_VENDOR directory"): >> On 23.03.2021 13:34, Jason Andryuk wrote: > ... >>> On Fedora, RPMs drop EFI binaries directly into /boot/efi/EFI/fedora/. >>> grub, shim, fwupdate and xen are all packaged that way.

Re: [ANNOUNCE] Xen 4.15 - release status, branching tomorrow

2021-03-23 Thread Roger Pau Monné
On Tue, Mar 23, 2021 at 03:17:38PM +, Ian Jackson wrote: > I think things are looking in reasonable shape. > > I intend to branch off the 4.15 stable branch tomorrow. I will then > turn off debug on that branch. There will be a commit moratorium in > force for much of the afternoon while

[ANNOUNCE] Xen 4.15 - release status, branching tomorrow

2021-03-23 Thread Ian Jackson
I think things are looking in reasonable shape. I intend to branch off the 4.15 stable branch tomorrow. I will then turn off debug on that branch. There will be a commit moratorium in force for much of the afternoon while the branching is done - commmitters please check your mail or irc. Any

[qemu-mainline test] 160328: regressions - FAIL

2021-03-23 Thread osstest service owner
flight 160328 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/160328/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-freebsd11-amd64 16 guest-saverestore fail REGR. vs. 152631

Re: [PATCH] xen: Create EFI_VENDOR directory

2021-03-23 Thread Ian Jackson
Jan Beulich writes ("Re: [PATCH] xen: Create EFI_VENDOR directory"): > On 23.03.2021 13:34, Jason Andryuk wrote: ... > > On Fedora, RPMs drop EFI binaries directly into /boot/efi/EFI/fedora/. > > grub, shim, fwupdate and xen are all packaged that way. It seems > > reasonable to have those

Re: [PATCH 0/4][4.15?] VT-d: mostly S3 related corrections

2021-03-23 Thread Ian Jackson
Jan Beulich writes ("Re: [PATCH 0/4][4.15?] VT-d: mostly S3 related corrections"): > Thanks Kevin. Ian - what are your thoughts here towards 4.15? I looked at these four patches. In general I am not sure of the implications. There are two important sets of implications: (i) upside: what is the

Re: [PATCH] xen: Create EFI_VENDOR directory

2021-03-23 Thread Jan Beulich
On 23.03.2021 13:34, Jason Andryuk wrote: > On Tue, Mar 23, 2021 at 3:23 AM Jan Beulich wrote: >> >> On 22.03.2021 18:08, Andrew Cooper wrote: >>> On 22/03/2021 15:15, Jan Beulich wrote: On 22.03.2021 15:59, Andrew Cooper wrote: > On 22/03/2021 14:52, Jan Beulich wrote: >> On

Re: [PATCH 1/4][4.15?] VT-d: correct off-by-1 in number-of-IOMMUs check

2021-03-23 Thread Ian Jackson
Jan Beulich writes ("[PATCH 1/4][4.15?] VT-d: correct off-by-1 in number-of-IOMMUs check"): > Otherwise, if we really run on a system with this many IOMMUs, > entering/leaving S3 would overrun iommu_state[]. Release-Acked-by: Ian Jackson

Re: [PATCH v2 for-4.14] tools: Fix pkg-config file for libxenstore

2021-03-23 Thread Ian Jackson
Wei Liu writes ("Re: [PATCH v2 for-4.14] tools: Fix pkg-config file for libxenstore"): > On Mon, Mar 22, 2021 at 04:38:47PM +, Andrew Cooper wrote: > > There are no dependenices on evtchn, ctrl or gnttab. > > > > Fixes: 1b008e99 ("tools: provide pkg-config file for libxenstore") > >

Re: [PATCH 0/4][4.15?] VT-d: mostly S3 related corrections

2021-03-23 Thread Jan Beulich
On 23.03.2021 09:12, Tian, Kevin wrote: >> From: Jan Beulich >> Sent: Thursday, March 18, 2021 6:12 PM >> >> None of these are regressions afaict, so considering how late we are >> in the 4.15 process, I can see reasons to not take any of these. All >> of them are backporting candidates though,

Re: [PATCH v2 for-4.14] tools: Fix pkg-config file for libxenstore

2021-03-23 Thread Wei Liu
On Mon, Mar 22, 2021 at 04:38:47PM +, Andrew Cooper wrote: > There are no dependenices on evtchn, ctrl or gnttab. > > Fixes: 1b008e99 ("tools: provide pkg-config file for libxenstore") > Signed-off-by: Andrew Cooper Acked-by: Wei Liu

Re: xen/evtchn: Dom0 boot hangs using preempt_rt kernel 5.10

2021-03-23 Thread Jason Andryuk
On Mon, Mar 22, 2021 at 3:09 PM Luca Fancellu wrote: > > Hi Juergen, > > Yes you are right it was my mistake, as you said to remove the BUG_ON(…) this > serie > (https://patchwork.kernel.org/project/xen-devel/cover/20210306161833.4552-1-jgr...@suse.com/) > is needed, since I’m using yocto I’m

Re: [PATCH] xen: Create EFI_VENDOR directory

2021-03-23 Thread Jason Andryuk
On Tue, Mar 23, 2021 at 3:23 AM Jan Beulich wrote: > > On 22.03.2021 18:08, Andrew Cooper wrote: > > On 22/03/2021 15:15, Jan Beulich wrote: > >> On 22.03.2021 15:59, Andrew Cooper wrote: > >>> On 22/03/2021 14:52, Jan Beulich wrote: > On 22.03.2021 14:33, Jason Andryuk wrote: > > make

Re: [PATCH] hvm/mtrr: remove unnecessary is_hvm_domain check

2021-03-23 Thread Jan Beulich
On 23.03.2021 12:29, Roger Pau Monne wrote: > epte_get_entry_emt will only be called for HVM domains, so the > is_hvm_domain check is unnecessary. It's a remnant of PVHv1. > > Shouldn't result in any functional change. > > Signed-off-by: Roger Pau Monné Reviewed-by: Jan Beulich

[PATCH] hvm/mtrr: remove unnecessary is_hvm_domain check

2021-03-23 Thread Roger Pau Monne
epte_get_entry_emt will only be called for HVM domains, so the is_hvm_domain check is unnecessary. It's a remnant of PVHv1. Shouldn't result in any functional change. Signed-off-by: Roger Pau Monné --- xen/arch/x86/hvm/mtrr.c | 6 ++ 1 file changed, 2 insertions(+), 4 deletions(-) diff

[xen-4.13-testing test] 160326: tolerable FAIL - PUSHED

2021-03-23 Thread osstest service owner
flight 160326 xen-4.13-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/160326/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stopfail like 160154

[PATCH 11/21] libs/guest: allow updating a cpu policy CPUID data

2021-03-23 Thread Roger Pau Monne
Introduce a helper to update the CPUID policy using an array of xen_cpuid_leaf_t entries. Note the leaves present in the input xen_cpuid_leaf_t array will replace any existing leaves on the policy. No user of the interface introduced on this patch. Signed-off-by: Roger Pau Monné ---

[PATCH 21/21] libs/guest: (re)move xc_cpu_policy_apply_cpuid

2021-03-23 Thread Roger Pau Monne
Move the logic from xc_cpu_policy_apply_cpuid into libxl, now that the xc_cpu_policy_* helpers allow modifying a cpu policy. Having xenguest parsing CPUID data in xend format was a layering violation, and by moving such parsing into libxl directly we can get rid of xc_xend_cpuid, as libxl will now

[PATCH 07/21] tools: switch existing users of xc_get_{system,domain}_cpu_policy

2021-03-23 Thread Roger Pau Monne
With the introduction of xc_cpu_policy_get_{system,domain} and xc_cpu_policy_serialise the current users of xc_get_{system,domain}_cpu_policy can be switched to the new interface. Note that xc_get_{system,domain}_cpu_policy is removed from the public interface and the functions are made static,

[PATCH 12/21] libs/guest: allow updating a cpu policy MSR data

2021-03-23 Thread Roger Pau Monne
Introduce a helper to update the MSR policy using an array of xen_msr_entry_t entries. Note the MSRs present in the input xen_msr_entry_t array will replace any existing entries on the policy. No user of the interface introduced on this patch. Signed-off-by: Roger Pau Monné ---

[PATCH 13/21] libs/guest: switch users of xc_set_domain_cpu_policy

2021-03-23 Thread Roger Pau Monne
To use the new cpu policy interface xc_cpu_policy_set_domain. Note that xc_set_domain_cpu_policy is removed from the interface and the function is made static to xg_cpuid_x86.c for it's internal callers. Signed-off-by: Roger Pau Monné --- tools/include/xenctrl.h | 5 -

[PATCH 20/21] libs/{light,guest}: implement xc_cpuid_apply_policy in libxl

2021-03-23 Thread Roger Pau Monne
With the addition of the xc_cpu_policy_* now libxl can have better control over the cpu policy, this allows removing the xc_cpuid_apply_policy function and instead coding the required bits by libxl in libxl__cpuid_legacy directly. Remove xc_cpuid_apply_policy. Signed-off-by: Roger Pau Monné ---

[PATCH 17/21] libs/guest: introduce helper set cpu topology in cpu policy

2021-03-23 Thread Roger Pau Monne
This logic is pulled out from xc_cpuid_apply_policy and placed into a separate helper. No functional change intended. Signed-off-by: Roger Pau Monné --- tools/include/xenctrl.h | 4 + tools/libs/guest/xg_cpuid_x86.c | 181 +--- 2 files changed, 102

[PATCH 19/21] libs/guest: apply a featureset into a cpu policy

2021-03-23 Thread Roger Pau Monne
Pull out the code from xc_cpuid_apply_policy that applies a featureset to a cpu policy and place it on it's own standalone function that's part of the public interface. No functional change intended. Signed-off-by: Roger Pau Monné --- tools/include/xenctrl.h | 5 ++

[PATCH 18/21] libs/guest: rework xc_cpuid_xend_policy

2021-03-23 Thread Roger Pau Monne
Rename xc_cpuid_xend_policy to xc_cpu_policy_apply_cpuid and make it public. Modify the function internally to use the new xc_cpu_policy_* set of functions. Also don't apply the passed policy to a domain directly, and instead modify the provided xc_cpu_policy_t. The caller will be responsible of

[PATCH 16/21] libs/guest: make a cpu policy compatible with older Xen versions

2021-03-23 Thread Roger Pau Monne
Older Xen versions used to expose some CPUID bits which are no longer exposed by default. In order to keep a compatible behavior with guests migrated from versions of Xen that don't encode the CPUID data on the migration stream introduce a function that sets the same bits as older Xen versions.

[PATCH 15/21] libs/guest: obtain a compatible cpu policy from two input ones

2021-03-23 Thread Roger Pau Monne
Introduce a helper to obtain a compatible cpu policy based on two input cpu policies. Currently this is done by and'ing all CPUID leaves and MSR entries, except for MSR_ARCH_CAPABILITIES which has the RSBA bit or'ed. The _AC macro is pulled from libxl_internal.h into xen-tools/libs.h since it's

[PATCH 14/21] libs/guest: introduce helper to check cpu policy compatibility

2021-03-23 Thread Roger Pau Monne
Such helpers is just a wrapper to the existing x86_cpu_policies_are_compatible function. This requires building policy.c from libx86 on user land also. No user of the interface introduced. Signed-off-by: Roger Pau Monné --- tools/include/xenctrl.h | 4 tools/libs/guest/Makefile

[PATCH 10/21] libs/guest: allow fetching a specific MSR entry from a cpu policy

2021-03-23 Thread Roger Pau Monne
Introduce an interface that returns a specific MSR entry from a cpu policy in xen_msr_entry_t format. This is useful to callers can peek data from the opaque xc_cpu_policy_t type. No caller of the interface introduced on this patch. Signed-off-by: Roger Pau Monné --- tools/include/xenctrl.h

[PATCH 09/21] libs/guest: allow fetching a specific CPUID leaf from a cpu policy

2021-03-23 Thread Roger Pau Monne
Introduce an interface that returns a specific leaf/subleaf from a cpu policy in xen_cpuid_leaf_t format. This is useful to callers can peek data from the opaque xc_cpu_policy_t type. No caller of the interface introduced on this patch. Signed-off-by: Roger Pau Monné ---

[PATCH 08/21] libs/guest: introduce a helper to apply a cpu policy to a domain

2021-03-23 Thread Roger Pau Monne
Such helper is very similar to the existing xc_set_domain_cpu_policy interface, but takes an opaque xc_cpu_policy_t instead of arrays of CPUID leaves and MSRs. No callers of the interface introduced in this patch. Signed-off-by: Roger Pau Monné --- tools/include/xenctrl.h | 2 ++

[PATCH 06/21] libs/guest: introduce helper to serialize a cpu policy

2021-03-23 Thread Roger Pau Monne
Such helper allow converting a cpu policy into an array of xen_cpuid_leaf_t and xen_msr_entry_t elements, which matches the current interface of the CPUID/MSR functions. This is required in order for the user to be able to parse the CPUID/MSR data. No user of the interface introduced in this

[PATCH 02/21] libs/guest: rename xc_get_cpu_policy_size to xc_cpu_policy_get_size

2021-03-23 Thread Roger Pau Monne
Preparatory change to introduce a new set of xc_cpu_policy_* functions that will replace the current CPUID/MSR helpers. No functional change intended. Signed-off-by: Roger Pau Monné --- tools/include/xenctrl.h | 2 +- tools/libs/guest/xg_cpuid_x86.c | 6 +++---

[PATCH 05/21] libs/guest: introduce helper to fetch a domain cpu policy

2021-03-23 Thread Roger Pau Monne
Such helper is based on the existing functions to fetch a CPUID and MSR policies, but uses the xc_cpu_policy_t type to return the data to the caller. No user of the interface introduced on the patch. Signed-off-by: Roger Pau Monné --- tools/include/xenctrl.h | 2 ++

[PATCH 04/21] libs/guest: introduce helper to fetch a system cpu policy

2021-03-23 Thread Roger Pau Monne
Such helper is based on the existing functions to fetch a CPUID and MSR policies, but uses the xc_cpu_policy_t type to return the data to the caller. Note some helper functions are introduced, those are split from xc_cpu_policy_get_system because they will be used by other functions also. No

[PATCH 03/21] libs/guest: introduce xc_cpu_policy_t

2021-03-23 Thread Roger Pau Monne
Introduce an opaque type that is used to store the CPUID and MSRs policies of a domain. Such type uses the existing cpu_policy structure to store the data, but doesn't expose the type to the users of the xenguest library. Introduce an allocation (init) and freeing function (destroy) to manage the

[PATCH 00/21] libs/guest: new CPUID/MSR interface

2021-03-23 Thread Roger Pau Monne
Hello, The following series introduces a new CPUID/MSR interface for the xenguest library. Such interface handles both CPUID and MSRs using the same opaque object, and provides some helpers for the user to peek or modify such data without exposing the backing type. This is useful for future

[PATCH 01/21] libxl: don't ignore the return value from xc_cpuid_apply_policy

2021-03-23 Thread Roger Pau Monne
Also change libxl__cpuid_legacy to propagate the error from xc_cpuid_apply_policy into callers. Signed-off-by: Roger Pau Monné --- tools/libs/light/libxl_cpuid.c| 15 +++ tools/libs/light/libxl_create.c | 5 +++-- tools/libs/light/libxl_dom.c | 2 +-

RE: [PATCH 0/4][4.15?] VT-d: mostly S3 related corrections

2021-03-23 Thread Tian, Kevin
> From: Jan Beulich > Sent: Thursday, March 18, 2021 6:12 PM > > None of these are regressions afaict, so considering how late we are > in the 4.15 process, I can see reasons to not take any of these. All > of them are backporting candidates though, imo. > > 1: correct off-by-1 in

Re: [PATCH] xen: Create EFI_VENDOR directory

2021-03-23 Thread Jan Beulich
On 22.03.2021 18:08, Andrew Cooper wrote: > On 22/03/2021 15:15, Jan Beulich wrote: >> On 22.03.2021 15:59, Andrew Cooper wrote: >>> On 22/03/2021 14:52, Jan Beulich wrote: On 22.03.2021 14:33, Jason Andryuk wrote: > make install-xen fails when EFI_VENDOR is set (=fedora) with: >

Re: [PATCH 2/2] Revert "xen: fix p2m size in dom0 for disabled memory hotplug case"

2021-03-23 Thread Jürgen Groß
On 17.03.21 12:04, Roger Pau Monne wrote: This partially reverts commit 882213990d32fd224340a4533f6318dd152be4b2. There's no need to special case XEN_UNPOPULATED_ALLOC anymore in order to correctly size the p2m. The generic memory hotplug option has already been tied together with the Xen