Re: CONFIG_XEN_VIRTIO{_FORCE_GRANT} interferes with nested virt

2022-10-05 Thread Juergen Gross
On 05.10.22 18:48, Marek Marczykowski-Górecki wrote: On Wed, Oct 05, 2022 at 05:45:56PM +0200, Juergen Gross wrote: On 05.10.22 17:35, Marek Marczykowski-Górecki wrote: On Wed, Oct 05, 2022 at 05:04:29PM +0200, Juergen Gross wrote: On 05.10.22 15:51, Marek Marczykowski-Górecki wrote: On Wed,

[ovmf test] 173437: all pass - PUSHED

2022-10-05 Thread osstest service owner
flight 173437 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/173437/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 710f83b79d6eab641401c054b2f40f6c630f8cd5 baseline version: ovmf 1bd2ff18664b9564a5802

Re: [PATCH] xen-pcifront: Handle missed Connected state

2022-10-05 Thread Juergen Gross
On 29.08.22 17:15, Jason Andryuk wrote: An HVM guest with linux stubdom and 2 PCI devices failed to start as libxl timed out waiting for the PCI devices to be added. It happens intermittently but with some regularity. libxl wrote the two xenstore entries for the devices, but then timed out wait

Re: [PATCH 2/2] xen/virtio: Fix potential deadlock when accessing xen_grant_dma_devices

2022-10-05 Thread Juergen Gross
On 05.10.22 19:48, Oleksandr Tyshchenko wrote: From: Oleksandr Tyshchenko As find_xen_grant_dma_data() is called from both interrupt and process contexts, the access to xen_grant_dma_devices XArray must be protected by xa_lock_irqsave to avoid deadlock scenario. As XArray API doesn't provide xa

[linux-5.4 test] 173433: regressions - FAIL

2022-10-05 Thread osstest service owner
flight 173433 linux-5.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/173433/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-amd 7 xen-installfail REGR. vs. 173353 test-armhf-armhf-xl-c

Re: [PATCH 1/2] xen/virtio: Fix n_pages calculation in xen_grant_dma_map(unmap)_page()

2022-10-05 Thread Juergen Gross
On 05.10.22 19:48, Oleksandr Tyshchenko wrote: From: Oleksandr Tyshchenko Take page offset into the account when calculating the number of pages to be granted. Signed-off-by: Oleksandr Tyshchenko Fixes: d6aca3504c7d ("xen/grant-dma-ops: Add option to restrict memory access under Xen") Revi

Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered

2022-10-05 Thread Demi Marie Obenour
On Wed, Oct 05, 2022 at 11:28:29PM +0200, Ard Biesheuvel wrote: > On Wed, 5 Oct 2022 at 20:11, Demi Marie Obenour > wrote: > > > > On Wed, Oct 05, 2022 at 08:15:07AM +0200, Jan Beulich wrote: > > > On 04.10.2022 17:46, Demi Marie Obenour wrote: > > > > Linux has a function called efi_mem_reserve()

[qemu-mainline test] 173431: trouble: broken/fail/pass

2022-10-05 Thread osstest service owner
flight 173431 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/173431/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-shadow broken test-amd64-amd64-xl

Re: [PATCH 2/2] xen/virtio: Fix potential deadlock when accessing xen_grant_dma_devices

2022-10-05 Thread Stefano Stabellini
On Wed, 5 Oct 2022, Oleksandr Tyshchenko wrote: > From: Oleksandr Tyshchenko > > As find_xen_grant_dma_data() is called from both interrupt and process > contexts, the access to xen_grant_dma_devices XArray must be protected > by xa_lock_irqsave to avoid deadlock scenario. > As XArray API doesn't

Re: [PATCH 1/2] xen/virtio: Fix n_pages calculation in xen_grant_dma_map(unmap)_page()

2022-10-05 Thread Stefano Stabellini
On Wed, 5 Oct 2022, Oleksandr Tyshchenko wrote: > From: Oleksandr Tyshchenko > > Take page offset into the account when calculating the number of pages > to be granted. > > Signed-off-by: Oleksandr Tyshchenko > Fixes: d6aca3504c7d ("xen/grant-dma-ops: Add option to restrict memory access > und

[xen-unstable test] 173430: tolerable FAIL - PUSHED

2022-10-05 Thread osstest service owner
flight 173430 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/173430/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 173422 test-amd64-i386-xl-qemuu-win7-amd64

Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered

2022-10-05 Thread Ard Biesheuvel
On Wed, 5 Oct 2022 at 20:11, Demi Marie Obenour wrote: > > On Wed, Oct 05, 2022 at 08:15:07AM +0200, Jan Beulich wrote: > > On 04.10.2022 17:46, Demi Marie Obenour wrote: > > > Linux has a function called efi_mem_reserve() that is used to reserve > > > EfiBootServicesData memory that contains e.g.

Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered

2022-10-05 Thread Demi Marie Obenour
On Wed, Oct 05, 2022 at 08:15:07AM +0200, Jan Beulich wrote: > On 04.10.2022 17:46, Demi Marie Obenour wrote: > > Linux has a function called efi_mem_reserve() that is used to reserve > > EfiBootServicesData memory that contains e.g. EFI configuration tables. > > This function does not work under X

Re: [PATCH][4.17] EFI: don't convert memory marked for runtime use to ordinary RAM

2022-10-05 Thread Julien Grall
Hi Jan, On 05/10/2022 12:55, Jan Beulich wrote: On 05.10.2022 12:44, Julien Grall wrote: On 04/10/2022 16:58, Jan Beulich wrote: On 30.09.2022 14:51, Bertrand Marquis wrote: On 30 Sep 2022, at 09:50, Jan Beulich wrote: efi_init_memory() in both relevant places is treating EFI_MEMORY_RUNTIME

[PATCH 2/2] xen/virtio: Fix potential deadlock when accessing xen_grant_dma_devices

2022-10-05 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko As find_xen_grant_dma_data() is called from both interrupt and process contexts, the access to xen_grant_dma_devices XArray must be protected by xa_lock_irqsave to avoid deadlock scenario. As XArray API doesn't provide xa_store_irqsave helper, call lockless __xa_store d

[PATCH 0/2] Misc fixes for Xen grant DMA-mapping layer

2022-10-05 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Hello all. These are several fixes I collected when playing with virtio-net device using Xen grant mappings. Tested with both virtio-blk and virtio-net devices. Oleksandr Tyshchenko (2): xen/virtio: Fix n_pages calculation in xen_grant_dma_map(unmap)_page() xen/v

[PATCH 1/2] xen/virtio: Fix n_pages calculation in xen_grant_dma_map(unmap)_page()

2022-10-05 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Take page offset into the account when calculating the number of pages to be granted. Signed-off-by: Oleksandr Tyshchenko Fixes: d6aca3504c7d ("xen/grant-dma-ops: Add option to restrict memory access under Xen") --- drivers/xen/grant-dma-ops.c | 5 +++-- 1 file chan

[linux-5.4 test] 173427: regressions - FAIL

2022-10-05 Thread osstest service owner
flight 173427 linux-5.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/173427/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-examine 5 host-install broken REGR. vs. 173353 test-amd64-i386-qemut

[linux-linus test] 173426: tolerable FAIL - PUSHED

2022-10-05 Thread osstest service owner
flight 173426 linux-linus real [real] flight 173432 linux-linus real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/173426/ http://logs.test-lab.xenproject.org/osstest/logs/173432/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-

Re: CONFIG_XEN_VIRTIO{_FORCE_GRANT} interferes with nested virt

2022-10-05 Thread Marek Marczykowski-Górecki
On Wed, Oct 05, 2022 at 05:45:56PM +0200, Juergen Gross wrote: > On 05.10.22 17:35, Marek Marczykowski-Górecki wrote: > > On Wed, Oct 05, 2022 at 05:04:29PM +0200, Juergen Gross wrote: > > > On 05.10.22 15:51, Marek Marczykowski-Górecki wrote: > > > > On Wed, Oct 05, 2022 at 03:34:56PM +0200, Juerg

Re: CONFIG_XEN_VIRTIO{_FORCE_GRANT} interferes with nested virt

2022-10-05 Thread Juergen Gross
On 05.10.22 17:35, Marek Marczykowski-Górecki wrote: On Wed, Oct 05, 2022 at 05:04:29PM +0200, Juergen Gross wrote: On 05.10.22 15:51, Marek Marczykowski-Górecki wrote: On Wed, Oct 05, 2022 at 03:34:56PM +0200, Juergen Gross wrote: On 05.10.22 15:25, Marek Marczykowski-Górecki wrote: On Wed,

Re: [PATCH for-4.17] x86/pci: allow BARs to be positioned on e820 reserved regions

2022-10-05 Thread Jan Beulich
On 05.10.2022 16:12, Roger Pau Monné wrote: > Hm, I have the following diff attached below which is more limited, > and not so bad I think. Initially I wanted to introduce an > efi_all_mapped() helper, but that would require exposing EFI_MEMORY_TYPE > which is quite intrusive. > > Let me know if

Re: CONFIG_XEN_VIRTIO{_FORCE_GRANT} interferes with nested virt

2022-10-05 Thread Marek Marczykowski-Górecki
On Wed, Oct 05, 2022 at 05:04:29PM +0200, Juergen Gross wrote: > On 05.10.22 15:51, Marek Marczykowski-Górecki wrote: > > On Wed, Oct 05, 2022 at 03:34:56PM +0200, Juergen Gross wrote: > > > On 05.10.22 15:25, Marek Marczykowski-Górecki wrote: > > > > On Wed, Oct 05, 2022 at 02:57:01PM +0200, Juerg

Re: CONFIG_XEN_VIRTIO{_FORCE_GRANT} interferes with nested virt

2022-10-05 Thread Juergen Gross
On 05.10.22 15:51, Marek Marczykowski-Górecki wrote: On Wed, Oct 05, 2022 at 03:34:56PM +0200, Juergen Gross wrote: On 05.10.22 15:25, Marek Marczykowski-Górecki wrote: On Wed, Oct 05, 2022 at 02:57:01PM +0200, Juergen Gross wrote: On 05.10.22 14:41, Marek Marczykowski-Górecki wrote: Hi, Whe

Re: [PATCH for-4.17] x86/pci: allow BARs to be positioned on e820 reserved regions

2022-10-05 Thread Roger Pau Monné
On Wed, Oct 05, 2022 at 10:53:38AM +0200, Jan Beulich wrote: > On 05.10.2022 10:37, Roger Pau Monné wrote: > > On Tue, Oct 04, 2022 at 06:11:50PM +0200, Jan Beulich wrote: > >> On 04.10.2022 17:36, Roger Pau Monne wrote: > >>> The EFI memory map contains two memory types (EfiMemoryMappedIO and > >>

Re: [PATCH 1/2] x86/cpuid: Infrastructure to support pseudo feature identifiers

2022-10-05 Thread Roger Pau Monné
On Wed, Oct 05, 2022 at 01:34:06PM +, Andrew Cooper wrote: > On 05/10/2022 10:55, Roger Pau Monné wrote: > > On Tue, Oct 04, 2022 at 05:08:09PM +0100, Andrew Cooper wrote: > >> A future change will want a cpuid-like identifier which doesn't have a > >> mapping > >> to a feature bit. > > Why we

Re: CONFIG_XEN_VIRTIO{_FORCE_GRANT} interferes with nested virt

2022-10-05 Thread Marek Marczykowski-Górecki
On Wed, Oct 05, 2022 at 03:34:56PM +0200, Juergen Gross wrote: > On 05.10.22 15:25, Marek Marczykowski-Górecki wrote: > > On Wed, Oct 05, 2022 at 02:57:01PM +0200, Juergen Gross wrote: > > > On 05.10.22 14:41, Marek Marczykowski-Górecki wrote: > > > > Hi, > > > > > > > > When booting Xen with Linu

Re: [PATCH 1/2] x86/cpuid: Infrastructure to support pseudo feature identifiers

2022-10-05 Thread Andrew Cooper
On 05/10/2022 14:11, Jan Beulich wrote: > On 05.10.2022 14:58, Andrew Cooper wrote: >> On 05/10/2022 07:59, Jan Beulich wrote: >>> On 04.10.2022 18:08, Andrew Cooper wrote: A future change will want a cpuid-like identifier which doesn't have a mapping to a feature bit. *

Re: CONFIG_XEN_VIRTIO{_FORCE_GRANT} interferes with nested virt

2022-10-05 Thread Juergen Gross
On 05.10.22 15:25, Marek Marczykowski-Górecki wrote: On Wed, Oct 05, 2022 at 02:57:01PM +0200, Juergen Gross wrote: On 05.10.22 14:41, Marek Marczykowski-Górecki wrote: Hi, When booting Xen with Linux dom0 nested under KVM, CONFIG_XEN_VIRTIO_FORCE_GRANT=y makes it unable to use virtio devices

Re: [PATCH 1/2] x86/cpuid: Infrastructure to support pseudo feature identifiers

2022-10-05 Thread Andrew Cooper
On 05/10/2022 10:55, Roger Pau Monné wrote: > On Tue, Oct 04, 2022 at 05:08:09PM +0100, Andrew Cooper wrote: >> A future change will want a cpuid-like identifier which doesn't have a >> mapping >> to a feature bit. > Why we prefer this logic over just giving such pseudo features a > synthetic bit

Re: [PATCH 2/2] x86: Activate Data Operand Invariant Timing Mode by default

2022-10-05 Thread Andrew Cooper
On 05/10/2022 13:09, Jan Beulich wrote: > On 05.10.2022 12:20, Roger Pau Monné wrote: >> On Tue, Oct 04, 2022 at 05:08:10PM +0100, Andrew Cooper wrote: >>> --- a/xen/arch/x86/cpu/common.c >>> +++ b/xen/arch/x86/cpu/common.c >>> @@ -209,6 +209,34 @@ void ctxt_switch_levelling(const struct vcpu *next

Re: CONFIG_XEN_VIRTIO{_FORCE_GRANT} interferes with nested virt

2022-10-05 Thread Marek Marczykowski-Górecki
On Wed, Oct 05, 2022 at 02:57:01PM +0200, Juergen Gross wrote: > On 05.10.22 14:41, Marek Marczykowski-Górecki wrote: > > Hi, > > > > When booting Xen with Linux dom0 nested under KVM, > > CONFIG_XEN_VIRTIO_FORCE_GRANT=y makes it unable to use virtio devices > > provided by L0 hypervisor (KVM with

[xen-unstable-smoke test] 173428: tolerable all pass - PUSHED

2022-10-05 Thread osstest service owner
flight 173428 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/173428/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [PATCH 1/2] x86/cpuid: Infrastructure to support pseudo feature identifiers

2022-10-05 Thread Jan Beulich
On 05.10.2022 14:58, Andrew Cooper wrote: > On 05/10/2022 07:59, Jan Beulich wrote: >> On 04.10.2022 18:08, Andrew Cooper wrote: >>> A future change will want a cpuid-like identifier which doesn't have a >>> mapping >>> to a feature bit. >>> >>> * Pass the feature name into the parse callback. >>

Re: CONFIG_XEN_VIRTIO{_FORCE_GRANT} interferes with nested virt

2022-10-05 Thread Juergen Gross
On 05.10.22 14:41, Marek Marczykowski-Górecki wrote: Hi, When booting Xen with Linux dom0 nested under KVM, CONFIG_XEN_VIRTIO_FORCE_GRANT=y makes it unable to use virtio devices provided by L0 hypervisor (KVM with qemu). With PV dom0, grants are required for virtio even if just CONFIG_XEN_VIRTIO

Re: [PATCH 1/2] x86/cpuid: Infrastructure to support pseudo feature identifiers

2022-10-05 Thread Andrew Cooper
On 05/10/2022 07:59, Jan Beulich wrote: > On 04.10.2022 18:08, Andrew Cooper wrote: >> A future change will want a cpuid-like identifier which doesn't have a >> mapping >> to a feature bit. >> >> * Pass the feature name into the parse callback. >> * Exclude a feature value of ~0u from falling in

CONFIG_XEN_VIRTIO{_FORCE_GRANT} interferes with nested virt

2022-10-05 Thread Marek Marczykowski-Górecki
Hi, When booting Xen with Linux dom0 nested under KVM, CONFIG_XEN_VIRTIO_FORCE_GRANT=y makes it unable to use virtio devices provided by L0 hypervisor (KVM with qemu). With PV dom0, grants are required for virtio even if just CONFIG_XEN_VIRTIO is enabled. This is probably uncommon corner case, bu

Re: [PATCH 2/2] x86: Activate Data Operand Invariant Timing Mode by default

2022-10-05 Thread Jan Beulich
On 05.10.2022 12:20, Roger Pau Monné wrote: > On Tue, Oct 04, 2022 at 05:08:10PM +0100, Andrew Cooper wrote: >> --- a/xen/arch/x86/cpu/common.c >> +++ b/xen/arch/x86/cpu/common.c >> @@ -209,6 +209,34 @@ void ctxt_switch_levelling(const struct vcpu *next) >> alternative_vcall(ctxt_switc

Re: [PATCH v3 2/4] xen/pv: fix vendor checks for pmu emulation

2022-10-05 Thread Jan Beulich
On 05.10.2022 13:03, Juergen Gross wrote: > The CPU vendor checks for pmu emulation are rather limited today, as > the assumption seems to be that only Intel and AMD are existing and/or > supported vendors. > > Fix that by handling Centaur and Zhaoxin CPUs the same way as Intel, > and Hygon the sa

Re: [PATCH v3 1/4] xen/pv: add fault recovery control to pmu msr accesses

2022-10-05 Thread Jan Beulich
On 05.10.2022 13:02, Juergen Gross wrote: > Today pmu_msr_read() and pmu_msr_write() fall back to the safe variants > of read/write MSR in case the MSR access isn't emulated via Xen. Allow > the caller to select that faults should not be recovered from by passing > NULL for the error pointer. > >

Re: [PATCH][4.17] EFI: don't convert memory marked for runtime use to ordinary RAM

2022-10-05 Thread Jan Beulich
On 05.10.2022 12:44, Julien Grall wrote: > On 04/10/2022 16:58, Jan Beulich wrote: >> On 30.09.2022 14:51, Bertrand Marquis wrote: On 30 Sep 2022, at 09:50, Jan Beulich wrote: efi_init_memory() in both relevant places is treating EFI_MEMORY_RUNTIME higher priority than the type

[PATCH v3 4/4] xen/pv: support selecting safe/unsafe msr accesses

2022-10-05 Thread Juergen Gross
Instead of always doing the safe variants for reading and writing MSRs in Xen PV guests, make the behavior controllable via Kconfig option and a boot parameter. The default will be the current behavior, which is to always use the safe variant. Signed-off-by: Juergen Gross --- .../admin-guide/ke

[PATCH v3 3/4] xen/pv: refactor msr access functions to support safe and unsafe accesses

2022-10-05 Thread Juergen Gross
Refactor and rename xen_read_msr_safe() and xen_write_msr_safe() to support both cases of MSR accesses, safe ones and potentially GP-fault generating ones. This will prepare to no longer swallow GPs silently in xen_read_msr() and xen_write_msr(). Signed-off-by: Juergen Gross Reviewed-by: Jan Beu

[PATCH v3 2/4] xen/pv: fix vendor checks for pmu emulation

2022-10-05 Thread Juergen Gross
The CPU vendor checks for pmu emulation are rather limited today, as the assumption seems to be that only Intel and AMD are existing and/or supported vendors. Fix that by handling Centaur and Zhaoxin CPUs the same way as Intel, and Hygon the same way as AMD. While at it fix the return type of is_

[PATCH v3 0/4] xen/pv: sanitize xen pv guest msr accesses

2022-10-05 Thread Juergen Gross
Historically when running as Xen PV guest all MSR accesses have been silently swallowing any GP faults, even when the kernel was using not the *msr_safe() access functions. Change that by making the behavior controllable via kernel config and via a boot parameter. This will help finding paths whe

[PATCH v3 1/4] xen/pv: add fault recovery control to pmu msr accesses

2022-10-05 Thread Juergen Gross
Today pmu_msr_read() and pmu_msr_write() fall back to the safe variants of read/write MSR in case the MSR access isn't emulated via Xen. Allow the caller to select that faults should not be recovered from by passing NULL for the error pointer. Restructure the code to make it more readable. Signed

[libvirt test] 173423: tolerable all pass - PUSHED

2022-10-05 Thread osstest service owner
flight 173423 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/173423/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check fail like 173413 test-armhf-armhf-libvirt 16 saveresto

Re: [PATCH][4.17] EFI: don't convert memory marked for runtime use to ordinary RAM

2022-10-05 Thread Julien Grall
Hi Jan, On 04/10/2022 16:58, Jan Beulich wrote: On 30.09.2022 14:51, Bertrand Marquis wrote: On 30 Sep 2022, at 09:50, Jan Beulich wrote: efi_init_memory() in both relevant places is treating EFI_MEMORY_RUNTIME higher priority than the type of the range. To avoid accessing memory at runtime w

Re: [PATCH 2/2] x86: Activate Data Operand Invariant Timing Mode by default

2022-10-05 Thread Roger Pau Monné
On Tue, Oct 04, 2022 at 05:08:10PM +0100, Andrew Cooper wrote: > Intel IceLake and later CPUs have microarchitectural behaviours which cause > data-dependent timing behaviour. This is not an issue for 99% of software, > but it is a problem for cryptography routines. On these CPUs, a new > archite

Re: [PATCH 1/2] x86/cpuid: Infrastructure to support pseudo feature identifiers

2022-10-05 Thread Roger Pau Monné
On Tue, Oct 04, 2022 at 05:08:09PM +0100, Andrew Cooper wrote: > A future change will want a cpuid-like identifier which doesn't have a mapping > to a feature bit. Why we prefer this logic over just giving such pseudo features a synthetic bit or akin? Could we have a bit more of a description abo

[xen-unstable test] 173422: tolerable FAIL

2022-10-05 Thread osstest service owner
flight 173422 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/173422/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-libvirt-xsm 7 xen-installfail pass in 173416 Tests which did not succeed, but

[PATCH v4 0/7] Make balloon drivers memory changes known to the rest of the kernel

2022-10-05 Thread Alexander Atanasov
Currently balloon drivers (Virtio,XEN, HyperV, VMWare, ...) inflate and deflate the guest memory size but there is no way to know how much the memory size is changed by them. A common use of the ballooning is to emulate [1] hot plug and hot unplug - due to the complexity of the later. Hotplug has

Re: [PATCH for-4.17] x86/pci: allow BARs to be positioned on e820 reserved regions

2022-10-05 Thread Jan Beulich
On 05.10.2022 10:37, Roger Pau Monné wrote: > On Tue, Oct 04, 2022 at 06:11:50PM +0200, Jan Beulich wrote: >> On 04.10.2022 17:36, Roger Pau Monne wrote: >>> The EFI memory map contains two memory types (EfiMemoryMappedIO and >>> EfiMemoryMappedIOPortSpace) used to describe IO memory areas used by

Re: [PATCH for-4.17] x86/pci: allow BARs to be positioned on e820 reserved regions

2022-10-05 Thread Roger Pau Monné
On Tue, Oct 04, 2022 at 06:11:50PM +0200, Jan Beulich wrote: > On 04.10.2022 17:36, Roger Pau Monne wrote: > > The EFI memory map contains two memory types (EfiMemoryMappedIO and > > EfiMemoryMappedIOPortSpace) used to describe IO memory areas used by > > EFI firmware. > > > > The current parsing

[linux-linus test] 173421: tolerable FAIL - PUSHED

2022-10-05 Thread osstest service owner
flight 173421 linux-linus real [real] flight 173425 linux-linus real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/173421/ http://logs.test-lab.xenproject.org/osstest/logs/173425/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-

[ovmf test] 173424: all pass - PUSHED

2022-10-05 Thread osstest service owner
flight 173424 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/173424/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 1bd2ff18664b9564a5802d0ac153b5023f2fa41e baseline version: ovmf f931506815548cee5a392

Re: [PATCH 1/2] x86/cpuid: Infrastructure to support pseudo feature identifiers

2022-10-05 Thread Jan Beulich
On 04.10.2022 18:08, Andrew Cooper wrote: > A future change will want a cpuid-like identifier which doesn't have a mapping > to a feature bit. > > * Pass the feature name into the parse callback. > * Exclude a feature value of ~0u from falling into the general set/clear bit >paths. > * In g