[linux-linus test] 174794: regressions - FAIL

2022-11-16 Thread osstest service owner
flight 174794 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/174794/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-examine 8 reboot fail REGR. vs. 173462

[ovmf test] 174796: all pass - PUSHED

2022-11-16 Thread osstest service owner
flight 174796 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/174796/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf fff6d81270b57ee786ea18ad74f43149b9f03494 baseline version: ovmf

Re: [PATCH 2/2] Do not access /dev/mem in MSI-X PCI passthrough on Xen

2022-11-16 Thread Marek Marczykowski-Górecki
On Wed, Nov 16, 2022 at 10:40:02PM +0100, Marek Marczykowski-Górecki wrote: > On Wed, Nov 16, 2022 at 02:15:22PM -0500, Jason Andryuk wrote: > > On Mon, Nov 14, 2022 at 2:21 PM Marek Marczykowski-Górecki > > wrote: > > > > > > The /dev/mem is used for two purposes: > > > - reading

[xen-unstable test] 174791: tolerable FAIL - PUSHED

2022-11-16 Thread osstest service owner
flight 174791 xen-unstable real [real] flight 174795 xen-unstable real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/174791/ http://logs.test-lab.xenproject.org/osstest/logs/174795/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking):

Re: [PATCH 3/4] xen/arm, libxl: Revert XEN_DOMCTL_shadow_op; use p2m mempool hypercalls

2022-11-16 Thread Stefano Stabellini
On Thu, 17 Nov 2022, Andrew Cooper wrote: > This reverts most of commit cf2a68d2ffbc3ce95e01449d46180bddb10d24a0, and bits > of cbea5a1149ca7fd4b7cdbfa3ec2e4f109b601ff7. > > First of all, with ARM borrowing x86's implementation, the logic to set the > pool size should have been common, not

Re: [PATCH 1/4] xen: Introduce non-broken hypercalls for the paging mempool size

2022-11-16 Thread Stefano Stabellini
On Thu, 17 Nov 2022, Andrew Cooper wrote: > The existing XEN_DOMCTL_SHADOW_OP_{GET,SET}_ALLOCATION have problems: > > * All set_allocation() flavours have an overflow-before-widen bug when >calculating "sc->mb << (20 - PAGE_SHIFT)". > * All flavours have a granularity of 1M. This was

[PATCH 2/4] tools/tests: Unit test for paging mempool size

2022-11-16 Thread Andrew Cooper
Exercise some basic functionality of the new xc_{get,set}_paging_mempool_size() hypercalls. This passes on x86, but fails currently on ARM. ARM will be fixed up in future patches. This is part of XSA-409 / CVE-2022-33747. Signed-off-by: Andrew Cooper Release-acked-by: Henry Wang --- CC: Jan

[PATCH 1/4] xen: Introduce non-broken hypercalls for the paging mempool size

2022-11-16 Thread Andrew Cooper
The existing XEN_DOMCTL_SHADOW_OP_{GET,SET}_ALLOCATION have problems: * All set_allocation() flavours have an overflow-before-widen bug when calculating "sc->mb << (20 - PAGE_SHIFT)". * All flavours have a granularity of 1M. This was tolerable when the size of the pool could only be set

[PATCH 4/4] xen/arm: Correct the p2m pool size calculations

2022-11-16 Thread Andrew Cooper
Allocating or freeing p2m pages doesn't alter the size of the mempool; only the split between free and used pages. Right now, the hypercalls operate on the free subset of the pool, meaning that XEN_DOMCTL_get_paging_mempool_size varies with time as the guest shuffles its physmap, and

[PATCH 3/4] xen/arm, libxl: Revert XEN_DOMCTL_shadow_op; use p2m mempool hypercalls

2022-11-16 Thread Andrew Cooper
This reverts most of commit cf2a68d2ffbc3ce95e01449d46180bddb10d24a0, and bits of cbea5a1149ca7fd4b7cdbfa3ec2e4f109b601ff7. First of all, with ARM borrowing x86's implementation, the logic to set the pool size should have been common, not duplicated. Introduce libxl__domain_set_p2m_pool_size()

[PATCH for-4.17 0/4] XSA-409 fixes

2022-11-16 Thread Andrew Cooper
For 4.17, and backport to all stable releases. Patch 2 doesn't technically need backporting, but it's safe and I'm dis-enclined to forgo testing in older releases. See patches for changelogs. Andrew Cooper (4): xen: Introduce non-broken hypercalls for the paging mempool size tools/tests:

RE: [PATCH for-4.17] x86/hvm: Revert per-domain APIC acceleration support

2022-11-16 Thread Henry Wang
Hi Andrew, > -Original Message- > From: Andrew Cooper > Subject: Re: [PATCH for-4.17] x86/hvm: Revert per-domain APIC acceleration > support > > >> Signed-off-by: Andrew Cooper > > Provisional upon Roger not objecting (i.e. him at least remaining > > neutral), and preferably with the

Re: [ImageBuilder] Do not set #xen,static-mem-{address/size}-cells

2022-11-16 Thread Stefano Stabellini
On Wed, 16 Nov 2022, Michal Orzel wrote: > Xen commit 942ac5fc15ec ("xen/arm, device-tree: Make static-mem > use #{address,size}-cells") dropped these custom properties in favor of > reusing regular #{address/size}-cells from the chosen node for the > xen,static-mem property. Reflect this change

Re: [PATCH 3/4] xen/arm, libxl: Revert XEN_DOMCTL_shadow_op; use p2m mempool hypercalls

2022-11-16 Thread Stefano Stabellini
On Wed, 16 Nov 2022, Julien Grall wrote: > On 16/11/2022 23:44, Stefano Stabellini wrote: > > On Wed, 16 Nov 2022, Andrew Cooper wrote: > > > On 16/11/2022 08:30, Jan Beulich wrote: > > > > On 16.11.2022 03:00, Stefano Stabellini wrote: > > > > > On Wed, 16 Nov 2022, Andrew Cooper wrote: > > > > >

Re: Xen Arm vpl011 UART will cause segmentation fault in Linux guest

2022-11-16 Thread Stefano Stabellini
On Wed, 16 Nov 2022, Andre Przywara wrote: > On Thu, 10 Nov 2022 12:32:49 -0800 (PST) > Stefano Stabellini wrote: > > On Wed, 9 Nov 2022, Michal Orzel wrote: > > > Hi Jiamei, > > > > > > On 09/11/2022 09:25, Jiamei Xie wrote: > > > > > > > > > > > > Hi Michal, > > > > > > > > Below log can

Re: [PATCH 3/4] xen/arm, libxl: Revert XEN_DOMCTL_shadow_op; use p2m mempool hypercalls

2022-11-16 Thread Julien Grall
Hi, On 16/11/2022 23:44, Stefano Stabellini wrote: On Wed, 16 Nov 2022, Andrew Cooper wrote: On 16/11/2022 08:30, Jan Beulich wrote: On 16.11.2022 03:00, Stefano Stabellini wrote: On Wed, 16 Nov 2022, Andrew Cooper wrote: On 16/11/2022 01:37, Stefano Stabellini wrote: On Wed, 26 Oct 2022,

Re: [PATCH 3/4] xen/arm, libxl: Revert XEN_DOMCTL_shadow_op; use p2m mempool hypercalls

2022-11-16 Thread Stefano Stabellini
On Wed, 16 Nov 2022, Andrew Cooper wrote: > On 16/11/2022 08:30, Jan Beulich wrote: > > On 16.11.2022 03:00, Stefano Stabellini wrote: > >> On Wed, 16 Nov 2022, Andrew Cooper wrote: > >>> On 16/11/2022 01:37, Stefano Stabellini wrote: > On Wed, 26 Oct 2022, Andrew Cooper wrote: > > This

Re: [PATCH 3/4] xen/arm, libxl: Revert XEN_DOMCTL_shadow_op; use p2m mempool hypercalls

2022-11-16 Thread Andrew Cooper
On 16/11/2022 08:30, Jan Beulich wrote: > On 16.11.2022 03:00, Stefano Stabellini wrote: >> On Wed, 16 Nov 2022, Andrew Cooper wrote: >>> On 16/11/2022 01:37, Stefano Stabellini wrote: On Wed, 26 Oct 2022, Andrew Cooper wrote: > This reverts most of commit

Re: [PATCH 2/2] Do not access /dev/mem in MSI-X PCI passthrough on Xen

2022-11-16 Thread Marek Marczykowski-Górecki
On Wed, Nov 16, 2022 at 02:15:22PM -0500, Jason Andryuk wrote: > On Mon, Nov 14, 2022 at 2:21 PM Marek Marczykowski-Górecki > wrote: > > > > The /dev/mem is used for two purposes: > > - reading PCI_MSIX_ENTRY_CTRL_MASKBIT > > - reading Pending Bit Array (PBA) > > > > The first one was

[linux-linus test] 174789: regressions - FAIL

2022-11-16 Thread osstest service owner
flight 174789 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/174789/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-arndale 8 xen-boot fail REGR. vs. 173462

[xen-unstable-smoke test] 174793: tolerable all pass - PUSHED

2022-11-16 Thread osstest service owner
flight 174793 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/174793/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

Re: [PATCH 2/2] Do not access /dev/mem in MSI-X PCI passthrough on Xen

2022-11-16 Thread Jason Andryuk
On Mon, Nov 14, 2022 at 2:21 PM Marek Marczykowski-Górecki wrote: > > The /dev/mem is used for two purposes: > - reading PCI_MSIX_ENTRY_CTRL_MASKBIT > - reading Pending Bit Array (PBA) > > The first one was originally done because when Xen did not send all > vector ctrl writes to the device

Re: [GIT PULL] xen: branch for v6.1-rc6

2022-11-16 Thread pr-tracker-bot
The pull request you sent on Wed, 16 Nov 2022 13:00:55 +0100: > git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git > for-linus-6.1-rc6-tag has been merged into torvalds/linux.git: https://git.kernel.org/torvalds/c/cc675d22e422442f6d230654a55a5fc5682ea018 Thank you! -- Deet-doot-dot, I

Re: [PATCH] xen/arm: debug-pl011.inc: Use macros instead of hardcoded values

2022-11-16 Thread Julien Grall
Hi Michal, On 16/11/2022 18:05, Michal Orzel wrote: On 16/11/2022 16:56, Julien Grall wrote: On 16/11/2022 14:45, Michal Orzel wrote: Hi Julien, Hi Michal, and use it in the pl011-debug files (+ there is a question whether we should define WLEN_7-5 for completeness). I would not

Re: [PATCH for-4.17] x86/hvm: Revert per-domain APIC acceleration support

2022-11-16 Thread Andrew Cooper
On 15/11/2022 08:49, Jan Beulich wrote: > On 15.11.2022 01:35, Andrew Cooper wrote: >> I was really hoping to avoid this, but its now too late in the 4.17 freeze >> and >> we still don't have working fixes. >> >> The in-Xen calculations for assistance capabilities are buggy. For the >> avoidance

Re: [PATCH] xen/arm: debug-pl011.inc: Use macros instead of hardcoded values

2022-11-16 Thread Michal Orzel
Hi Julien, On 16/11/2022 16:56, Julien Grall wrote: > > > On 16/11/2022 14:45, Michal Orzel wrote: >> Hi Julien, > > Hi Michal, > >>> and use it in the pl011-debug files (+ there is a question whether we should define WLEN_7-5 for completeness). >>> >>> I would not define WLEN_7-5.

Re: [PATCH] x86/pvh: do not forward MADT Local APIC NMI structures to dom0

2022-11-16 Thread Roger Pau Monné
On Wed, Nov 16, 2022 at 04:56:41PM +, Andrew Cooper wrote: > On 16/11/2022 16:42, Roger Pau Monne wrote: > > Currently Xen will passthrough any Local APIC NMI Structure found in > > the native ACPI MADT table to a PVH dom0. This is wrong because PVH > > doesn't have access to the physical

[xen-unstable-smoke test] 174790: tolerable all pass - PUSHED

2022-11-16 Thread osstest service owner
flight 174790 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/174790/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

Re: [PATCH] x86/pvh: do not forward MADT Local APIC NMI structures to dom0

2022-11-16 Thread Andrew Cooper
On 16/11/2022 16:42, Roger Pau Monne wrote: > Currently Xen will passthrough any Local APIC NMI Structure found in > the native ACPI MADT table to a PVH dom0. This is wrong because PVH > doesn't have access to the physical local APIC, and instead gets an > emulated local APIC by Xen, that doesn't

[qemu-mainline test] 174788: tolerable FAIL - PUSHED

2022-11-16 Thread osstest service owner
flight 174788 qemu-mainline real [real] flight 174792 qemu-mainline real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/174788/ http://logs.test-lab.xenproject.org/osstest/logs/174792/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking):

[PATCH] x86/pvh: do not forward MADT Local APIC NMI structures to dom0

2022-11-16 Thread Roger Pau Monne
Currently Xen will passthrough any Local APIC NMI Structure found in the native ACPI MADT table to a PVH dom0. This is wrong because PVH doesn't have access to the physical local APIC, and instead gets an emulated local APIC by Xen, that doesn't have the LINT0 or LINT1 pins wired to anything.

Re: [XEN PATCH for-4.17 v2 5/6] Rework COPYING installed in /usr/include/xen/, due to several licences

2022-11-16 Thread Andrew Cooper
On 16/11/2022 15:26, Andrew Cooper wrote: > On 03/11/2022 11:52, Anthony PERARD wrote: >> diff --git a/tools/include/xen/COPYING b/tools/include/xen/COPYING >> new file mode 100644 >> index 00..fe3f9b7557 >> --- /dev/null >> +++ b/tools/include/xen/COPYING >> @@ -0,0 +1,26 @@ >> +XEN

Re: [PATCH] xen/arm: debug-pl011.inc: Use macros instead of hardcoded values

2022-11-16 Thread Julien Grall
On 16/11/2022 14:45, Michal Orzel wrote: Hi Julien, Hi Michal, and use it in the pl011-debug files (+ there is a question whether we should define WLEN_7-5 for completeness). I would not define WLEN_7-5. That said, I wonder if we really need to set the baud rate & co here? AFAICT the

Re: [XEN PATCH for-4.17 v2 5/6] Rework COPYING installed in /usr/include/xen/, due to several licences

2022-11-16 Thread Andrew Cooper
On 03/11/2022 11:52, Anthony PERARD wrote: > diff --git a/tools/include/xen/COPYING b/tools/include/xen/COPYING > new file mode 100644 > index 00..fe3f9b7557 > --- /dev/null > +++ b/tools/include/xen/COPYING > @@ -0,0 +1,26 @@ > +XEN NOTICE > +== > + > +This licence applies to all

Re: [XEN PATCH for-4.17 v2 5/6] Rework COPYING installed in /usr/include/xen/, due to several licences

2022-11-16 Thread Anthony PERARD
On Thu, Nov 03, 2022 at 11:52:03AM +, Anthony PERARD wrote: > The notice in the COPYING file in "xen/include/public/COPYING" doesn't > really apply to the files that ultimately are been install at > "/usr/include/xen". The issue are headers in the "sys/" subdirectory > that comes from other

Re: [XEN PATCH for-4.17 v2 3/6] tools/include/xen-foreign: Add SPDX identifier to generated headers

2022-11-16 Thread Andrew Cooper
On 03/11/2022 11:52, Anthony PERARD wrote: > diff --git a/tools/include/xen-foreign/mkheader.py > b/tools/include/xen-foreign/mkheader.py > index fb268f0dce..ec8a321395 100644 > --- a/tools/include/xen-foreign/mkheader.py > +++ b/tools/include/xen-foreign/mkheader.py > @@ -1,5 +1,6 @@ >

Re: [PATCH] xen/arm: debug-pl011.inc: Use macros instead of hardcoded values

2022-11-16 Thread Michal Orzel
Hi Julien, On 16/11/2022 14:41, Julien Grall wrote: > > > On 16/11/2022 08:05, Michal Orzel wrote: >> On 16/11/2022 00:10, Julien Grall wrote: >>> >>> >>> Hi Michal, >>> >>> On 24/10/2022 11:05, Michal Orzel wrote: Make use of the macros defined in asm/pl011-uart.h instead of hardcoding

[libvirt test] 174787: tolerable all pass - PUSHED

2022-11-16 Thread osstest service owner
flight 174787 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/174787/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 174775 test-armhf-armhf-libvirt-raw 15

[xen-unstable test] 174784: trouble: broken/fail/pass

2022-11-16 Thread osstest service owner
flight 174784 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/174784/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-credit1 broken Tests which are

Re: [PATCH] xen/arm: debug-pl011.inc: Use macros instead of hardcoded values

2022-11-16 Thread Julien Grall
On 16/11/2022 08:05, Michal Orzel wrote: On 16/11/2022 00:10, Julien Grall wrote: Hi Michal, On 24/10/2022 11:05, Michal Orzel wrote: Make use of the macros defined in asm/pl011-uart.h instead of hardcoding the values. Also, take the opportunity to fix the file extension in a top-level

RE: Xen Arm vpl011 UART will cause segmentation fault in Linux guest

2022-11-16 Thread Jiamei Xie
Hi I also wrote a patch to make xen ignore the DMACR write and tested it. It also can fix this segmentation fault issue. Best wishes Jiamei Xie > -Original Message- > From: Jiamei Xie > Sent: Wednesday, November 16, 2022 8:46 PM > To: Jiamei Xie ; Stefano Stabellini > ; Michal Orzel

RE: Xen Arm vpl011 UART will cause segmentation fault in Linux guest

2022-11-16 Thread Jiamei Xie
Hi I have wrote a kernel patch to fix this. And I have tested. It will not have segmentation fault. Best wishes Jiamei Xie > -Original Message- > From: Xen-devel On Behalf Of > Jiamei Xie > Sent: Friday, November 11, 2022 12:31 PM > To: Stefano Stabellini ; Michal Orzel > > Cc:

[PATCH v2] x86/irq: do not release irq until all cleanup is done

2022-11-16 Thread Roger Pau Monne
Current code in _clear_irq_vector() will mark the irq as unused before doing the cleanup required when move_in_progress is true. This can lead to races in create_irq() if the function picks an irq desc that's been marked as unused but has move_in_progress set, as the call to assign_irq_vector()

[GIT PULL] xen: branch for v6.1-rc6

2022-11-16 Thread Juergen Gross
Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-6.1-rc6-tag xen: branch for v6.1-rc6 It contains two trivial cleanups, and 3 simple fixes. Thanks. Juergen arch/x86/xen/enlighten_pv.c | 3 ++-

Re: [PATCH for-4.17] x86/spec-ctrl: Fill in whitepaper URL

2022-11-16 Thread Andrew Cooper
On 16/11/2022 11:28, Henry Wang wrote: > Hi Andrew, > >> -Original Message- >> From: Jan Beulich >> Subject: Re: [PATCH for-4.17] x86/spec-ctrl: Fill in whitepaper URL >> >> On 14.11.2022 22:43, Andrew Cooper wrote: >>> ... now that we a link available. >>> >>> Fixes: 9deaf2d932f0

[linux-linus test] 174783: regressions - FAIL

2022-11-16 Thread osstest service owner
flight 174783 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/174783/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-examine 8 reboot fail REGR. vs. 173462

RE: [PATCH for-4.17] x86/spec-ctrl: Fill in whitepaper URL

2022-11-16 Thread Henry Wang
Hi Andrew, > -Original Message- > From: Jan Beulich > Subject: Re: [PATCH for-4.17] x86/spec-ctrl: Fill in whitepaper URL > > On 14.11.2022 22:43, Andrew Cooper wrote: > > ... now that we a link available. > > > > Fixes: 9deaf2d932f0 ("x86/spec-ctrl: Enable Zen2 chickenbit") > >

Re: Xen Arm vpl011 UART will cause segmentation fault in Linux guest

2022-11-16 Thread Andre Przywara
On Thu, 10 Nov 2022 12:32:49 -0800 (PST) Stefano Stabellini wrote: Hi, > On Wed, 9 Nov 2022, Michal Orzel wrote: > > Hi Jiamei, > > > > On 09/11/2022 09:25, Jiamei Xie wrote: > > > > > > > > > Hi Michal, > > > > > > Below log can be got when stating the linux guest. It says 9c09 is sbsa.

[ovmf test] 174785: all pass - PUSHED

2022-11-16 Thread osstest service owner
flight 174785 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/174785/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 93629f2c7cf05ebc0f458eacc42a33147096f9d1 baseline version: ovmf

Re: [PATCH for-4.17 v4 2/2] amd: remove VIRT_SC_MSR_HVM synthetic feature

2022-11-16 Thread Roger Pau Monné
On Wed, Nov 16, 2022 at 08:41:06AM +0100, Jan Beulich wrote: > On 16.11.2022 00:54, Andrew Cooper wrote: > > On 15/11/2022 16:44, Jan Beulich wrote: > >> I think we need to settle on at least halfway firm rules on when to use > >> synthetic feature bits and when to use plain global booleans.

Re: [PATCH for-4.17 v4 0/2] amd/virt_ssbd: refactoring and fixes

2022-11-16 Thread Roger Pau Monné
On Wed, Nov 16, 2022 at 12:27:29AM +, Andrew Cooper wrote: > On 15/11/2022 13:26, Roger Pau Monne wrote: > > Hello, > > > > Just two patches remaining, and the last one is already Acked. > > > > First patch deals with moving the switching of SSBD from guest > > vm{entry,exit} to vCPU context

[RFC] docs/misra: List files in Xen originated from external sources

2022-11-16 Thread Michal Orzel
Add a file with a table listing files in the Xen codebase that originated from external sources (e.g. Linux kernel). This is done in order to improve traceability, help with the review process and act as a base for listing files to exclude from MISRA checkers. Signed-off-by: Michal Orzel ---

[ImageBuilder] Do not set #xen,static-mem-{address/size}-cells

2022-11-16 Thread Michal Orzel
Xen commit 942ac5fc15ec ("xen/arm, device-tree: Make static-mem use #{address,size}-cells") dropped these custom properties in favor of reusing regular #{address/size}-cells from the chosen node for the xen,static-mem property. Reflect this change in ImageBuilder. Signed-off-by: Michal Orzel ---

Re: [PATCH 3/4] xen/arm, libxl: Revert XEN_DOMCTL_shadow_op; use p2m mempool hypercalls

2022-11-16 Thread Jan Beulich
On 16.11.2022 03:00, Stefano Stabellini wrote: > On Wed, 16 Nov 2022, Andrew Cooper wrote: >> On 16/11/2022 01:37, Stefano Stabellini wrote: >>> On Wed, 26 Oct 2022, Andrew Cooper wrote: This reverts most of commit cf2a68d2ffbc3ce95e01449d46180bddb10d24a0, and bits of

Re: [PATCH 1/4] xen: Introduce non-broken hypercalls for the p2m pool size

2022-11-16 Thread Jan Beulich
On 16.11.2022 02:19, Stefano Stabellini wrote: > On Fri, 28 Oct 2022, George Dunlap wrote: >> On Thu, Oct 27, 2022 at 8:12 AM Jan Beulich wrote: >> On 26.10.2022 21:22, Andrew Cooper wrote: >> > On 26/10/2022 14:42, Jan Beulich wrote: >> >>   >> > paging isn't a great name. 

Re: [XEN PATCH for-4.17 v2 6/6] xen: Used SPDX identifier in public headers

2022-11-16 Thread Jan Beulich
On 03.11.2022 12:52, Anthony PERARD wrote: > The text of the licence has been check to be the same as the one at > https://spdx.org/licenses/MIT.html, except we don't have "(including > the next paragraph)". > > Mecanical change done with a script. > > Signed-off-by: Anthony PERARD Acked-by:

RE: [PATCH v2 3/3] CHANGELOG: Start new "unstable" section

2022-11-16 Thread Henry Wang
Hi Jan, > -Original Message- > From: Jan Beulich > Subject: Re: [PATCH v2 3/3] CHANGELOG: Start new "unstable" section > > On 16.11.2022 05:26, Henry Wang wrote: > > --- a/CHANGELOG.md > > +++ b/CHANGELOG.md > > @@ -4,6 +4,8 @@ Notable changes to Xen will be documented in this file. > >

Re: [XEN PATCH for-4.17 v2 2/6] xen: Used SPDX identifier in some public headers

2022-11-16 Thread Jan Beulich
On 03.11.2022 12:52, Anthony PERARD wrote: > The script "tools/include/xen-foreign/mkheader.py" is going to do a > sanity check on the licences of those headers. To ease this, we will > replace the verbatim copy of the MIT licence by its SPDX identifier > equivalent. > > The text of the licence

Re: [XEN PATCH for-4.17 v2 1/6] xen: Add licence information to public/errno.h

2022-11-16 Thread Jan Beulich
On 03.11.2022 12:51, Anthony PERARD wrote: > Fixes: 81f559e97974 ("make error codes a formal part of the ABI") > Reported-by: Andrew Cooper > Signed-off-by: Anthony PERARD Acked-by: Jan Beulich

Re: [PATCH v2 3/3] CHANGELOG: Start new "unstable" section

2022-11-16 Thread Jan Beulich
On 16.11.2022 05:26, Henry Wang wrote: > --- a/CHANGELOG.md > +++ b/CHANGELOG.md > @@ -4,6 +4,8 @@ Notable changes to Xen will be documented in this file. > > The format is based on [Keep a > Changelog](https://keepachangelog.com/en/1.0.0/) > > +## [unstable >

Re: [PATCH] xen/arm: debug-pl011.inc: Use macros instead of hardcoded values

2022-11-16 Thread Michal Orzel
Hi Julien, On 16/11/2022 00:10, Julien Grall wrote: > > > Hi Michal, > > On 24/10/2022 11:05, Michal Orzel wrote: >> Make use of the macros defined in asm/pl011-uart.h instead of hardcoding >> the values. Also, take the opportunity to fix the file extension in a >> top-level comment. >> >> No