Re: [Xen-devel] [PATCH v2] x86/apicv: enhance posted-interrupt processing

2017-03-01 Thread Xuquan (Quan Xu)
On March 01, 2017 2:24 PM, wrote: >On Wed, Mar 01, 2017 at 12:38:39AM -0700, Jan Beulich wrote: > On 01.03.17 at 04:23, wrote: >>> On February 28, 2017 11:08 PM, Jan Beulich wrote: >>> On 27.02.17 at 11:53, wrote: > If guest is already in non-root mode, an posted interrupt will be >>>

[Xen-devel] [ovmf test] 106328: regressions - FAIL

2017-03-01 Thread osstest service owner
flight 106328 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/106328/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963 test-amd64-amd64-xl-qemuu-

Re: [Xen-devel] [PATCH v2] x86/apicv: enhance posted-interrupt processing

2017-03-01 Thread Tian, Kevin
> From: Gao, Chao > Sent: Wednesday, March 01, 2017 2:24 PM > > > Good point. I ignore v->processor maybe change. I have thought over > __vmx_deliver_posted_interrupt() again and want to share you my > opinion. > First of all, __vmx_deliver_posted_interrupt() is to let the target > vCPU sync PIR

[Xen-devel] [qemu-mainline test] 106316: regressions - FAIL

2017-03-01 Thread osstest service owner
flight 106316 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/106316/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 106266 Regress

Re: [Xen-devel] Virtual Interrupt Delivery

2017-03-01 Thread Tian, Kevin
> From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > Sent: Thursday, March 02, 2017 4:36 AM > > On Mon, Feb 27, 2017 at 09:13:29PM +0300, Dmitry Rockosov wrote: > > Hi guys, > > > > Do you know when *recognized* Virtual Interrupt on VM-Entry will be > > delivered if Virtual-Interrupt De

Re: [Xen-devel] [PATCH v2 1/3] x86: remove PVHv1 code

2017-03-01 Thread Tian, Kevin
> -Original Message- > From: Roger Pau Monne [mailto:roger@citrix.com] > Sent: Wednesday, March 01, 2017 1:40 AM > To: xen-de...@lists.xenproject.org > Cc: Roger Pau Monne; Ian Jackson; Wei Liu; Elena Ufimtseva; Jan Beulich; > Andrew Cooper; > Paul Durrant; Nakajima, Jun; Tian, Kevin

Re: [Xen-devel] [PATCH v4 2/2] x86/vpmu: Disable VPMU if guest's CPUID indicates no PMU support

2017-03-01 Thread Tian, Kevin
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] > Sent: Wednesday, March 01, 2017 11:07 PM > > When toolstack overrides Intel CPUID leaf 0xa's PMU version with an > invalid value VPMU should not be available to the guest. > > Signed-off-by: Boris Ostrovsky > Reviewed-by: Jan Beulich

Re: [Xen-devel] [PATCH 8/8] x86/VMX: switch away from temporary 32-bit register names

2017-03-01 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Tuesday, February 28, 2017 9:39 PM > > Signed-off-by: Jan Beulich > Acked-by: Kevin Tian ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

[Xen-devel] [linux-linus test] 106312: regressions - FAIL

2017-03-01 Thread osstest service owner
flight 106312 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/106312/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 59254 test-armhf-armhf-xl

[Xen-devel] [PATCH v2 0/4] build enhancements related to qemu

2017-03-01 Thread Juergen Gross
Last week I started an effort to use upstream qemu as a replacement for qemu-trad in ioemu stubdom. This small series addresses some problems I met in this effort. I believe all modifications are worth doing regardless whether qemu upstream stubdom will become a reality or not. Changes in V2: - Re

[Xen-devel] [PATCH v2 2/4] tools: add pkg-config file for libxc

2017-03-01 Thread Juergen Gross
When configuring the build of qemu the configure script is building various test programs to determine the exact version of libxencontrol. Instead of a try and error approach needing updates for nearly each new version of Xen just provide xencontrol.pc to be used via pkg-config. In the end we nee

[Xen-devel] [PATCH v2 4/4] tools: set pkg-config path when configuring qemu

2017-03-01 Thread Juergen Gross
When calling configure for qemu provide the local pkg-config directory in order to let the configure process find the libxenctrl version. Signed-off-by: Juergen Gross Acked-by: Ian Jackson --- tools/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/Makefile b/tools/Makefile ind

[Xen-devel] [PATCH v2 3/4] tools: use a dedicated build directory for qemu

2017-03-01 Thread Juergen Gross
Instead of using the downloaded git tree as target directory for the qemu build create a dedicated directory for that purpose. This way it is possible to use the same source directory of qemu to configure and build qemu upstream in a stubdom environment in future. Signed-off-by: Juergen Gross Ac

[Xen-devel] [PATCH v2 1/4] stubdom: set xen interface version for stubdom apps using xenctrl.h

2017-03-01 Thread Juergen Gross
A stubdom app using xenctrl.h must use the latest interface version of Xen in order to avoid compatibility issues. Add the related config item to the stubdom config files where needed. Signed-off-by: Juergen Gross --- stubdom/ioemu-minios.cfg | 1 + 1 file changed, 1 insertion(+) diff --git a/s

[Xen-devel] [xen-unstable test] 106307: regressions - FAIL

2017-03-01 Thread osstest service owner
flight 106307 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/106307/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-cubietruck 15 guest-start/debian.repeat fail REGR. vs. 105933 test-armhf-arm

[Xen-devel] About UMIP unit test.

2017-03-01 Thread Yu Zhang
Hi Jan, Previously I saw your UMIP patches merged in xen, and we'd like to try some unit test here in Intel. And I wonder do you have any unit test code for this feature, or any suggestions? :) Thanks Yu ___ Xen-devel mailing list Xen-devel@lists

Re: [Xen-devel] [PATCH 5/5] xen: use libxendevicemodel when available

2017-03-01 Thread Stefano Stabellini
On Thu, 23 Feb 2017, Paul Durrant wrote: > This patch modifies the wrapper functions in xen_common.h to use the > new xendevicemodel interface if it is available along with compatibility > code to use the old libxenctrl interface if it is not. > > Signed-off-by: Paul Durrant Hi Paul, Sorry for

Re: [Xen-devel] kpartx for raisin hvm tests

2017-03-01 Thread Stefano Stabellini
On Wed, 1 Mar 2017, Gémes Géza wrote: > 2017-03-01 20:48 keltezéssel, Stefano Stabellini írta: > > On Wed, 1 Mar 2017, Gémes Géza wrote: > > > 2017-02-27 23:52 keltezéssel, Stefano Stabellini írta: > > > > On Wed, 22 Feb 2017, Géza Gémes wrote: > > > > > On 2017-02-21 23:10, Stefano Stabellini wrot

Re: [Xen-devel] [RAISIN] Allow-running-tests-as-non-root

2017-03-01 Thread Stefano Stabellini
> From: Gémes Géza > Date: Wed, 1 Mar 2017 18:39:51 +0100 > Subject: [PATCH] Allow running tests as non-root > > Allow a user with sudo rights to run the tests > > Signed-off-by: Gémes Géza Reviewed-by: Stefano Stabellini I'll commit. > --- > lib/common-tests.sh | 50 ++

[Xen-devel] xen/arm and swiotlb-xen: possible data corruption

2017-03-01 Thread Stefano Stabellini
Hi all, Edgar reported a data corruption on network packets in dom0 when the swiotlb-xen is in use. He also reported that the following patch "fixes" the problem for him: static void __xen_dma_page_cpu_to_dev(struct device *hwdev, dma_addr_t handle, size_t size, enum dma_data_dir

[Xen-devel] [ovmf test] 106308: regressions - FAIL

2017-03-01 Thread osstest service owner
flight 106308 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/106308/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963 test-amd64-amd64-xl-qemuu-

[Xen-devel] [xen-unstable bisection] complete test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm

2017-03-01 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm testid xen-boot Tree: linux git://xenbits.xen.org/linux-pvops.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git Tree:

Re: [Xen-devel] [PATCH v5 1/3] arm: remove irq from inflight, then change physical affinity

2017-03-01 Thread Julien Grall
Hi Stefano, On 01/03/2017 22:15, Stefano Stabellini wrote: This patch fixes a potential race that could happen when gic_update_one_lr and vgic_vcpu_inject_irq run simultaneously. When GIC_IRQ_GUEST_MIGRATING is set, we must make sure that the irq has been removed from inflight before changing p

Re: [Xen-devel] [PULL 0/2] tags/xen-20170228-tag

2017-03-01 Thread Peter Maydell
On 28 February 2017 at 19:15, Stefano Stabellini wrote: > The following changes since commit 7d1730b7d9d8272a13245adfc9b0405e5a4bd0c2: > > Merge remote-tracking branch 'remotes/mjt/tags/trivial-patches-fetch' into > staging (2017-02-28 16:22:41 +) > > are available in the git repository at:

[Xen-devel] [xen-unstable-smoke test] 106320: tolerable trouble: broken/fail/pass - PUSHED

2017-03-01 Thread osstest service owner
flight 106320 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/106320/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 12 mig

[Xen-devel] [PATCH v5 2/3] xen/arm: move setting of new target vcpu to vgic_migrate_irq

2017-03-01 Thread Stefano Stabellini
Move the atomic write of rank->vcpu, which sets the new vcpu target, to vgic_migrate_irq, at the beginning of the lock protected area (protected by the vgic lock). This code movement reduces race conditions between vgic_migrate_irq and setting rank->vcpu on one pcpu and gic_update_one_lr on anothe

[Xen-devel] [PATCH v5 1/3] arm: remove irq from inflight, then change physical affinity

2017-03-01 Thread Stefano Stabellini
This patch fixes a potential race that could happen when gic_update_one_lr and vgic_vcpu_inject_irq run simultaneously. When GIC_IRQ_GUEST_MIGRATING is set, we must make sure that the irq has been removed from inflight before changing physical affinity, to avoid concurrent accesses to p->inflight,

[Xen-devel] [PATCH v5 3/3] xen/arm: vgic_migrate_irq: do not race against GIC_IRQ_GUEST_MIGRATING

2017-03-01 Thread Stefano Stabellini
A potential race condition occurs when vgic_migrate_irq is called a second time, while GIC_IRQ_GUEST_MIGRATING is already set. In that case, vgic_migrate_irq takes a different vgic lock from gic_update_one_lr. vgic_migrate_irq running concurrently with gic_update_one_lr could cause data corruptions

[Xen-devel] [PATCH v5 0/3] xen/arm: remove race conditions in irq migration

2017-03-01 Thread Stefano Stabellini
Hi all, this patch series removes three race conditions affecting the current code base. The first race condition is between gic_update_one_lr and vgic_vcpu_inject_irq: as soon as gic_update_one_lr calls irq_set_affinity a new interrupt could be injected in the new pcpu, eventually vgic_vcpu_inje

Re: [Xen-devel] [PATCH v2 1/7] xen/mce: adjust comment of callback register functions

2017-03-01 Thread Konrad Rzeszutek Wilk
On Mon, Feb 27, 2017 at 01:09:06PM +0800, Haozhong Zhang wrote: > c/s e966818264908e842e2847f579ca4d94e586eaac added > mce_need_clearbank_register below the comment of > x86_mce_callback_register(). This commit (1) adjusts the first > paragraph of comment to be a general statement of all callback >

Re: [Xen-devel] [PATCH linux v3 2/9] x86/acpi: store ACPI ids from MADT for future usage

2017-03-01 Thread Boris Ostrovsky
On 03/01/2017 02:54 PM, Thomas Gleixner wrote: > > Yes, I know it has been fixed later, but this crap should not have been > merged in the first place. > > Yours grumpy > > tglx Yes, we dropped the ball on this, this shouldn't have gone in without x86 maintainers' review. -boris

Re: [Xen-devel] kpartx for raisin hvm tests

2017-03-01 Thread Gémes Géza
2017-03-01 20:48 keltezéssel, Stefano Stabellini írta: On Wed, 1 Mar 2017, Gémes Géza wrote: 2017-02-27 23:52 keltezéssel, Stefano Stabellini írta: On Wed, 22 Feb 2017, Géza Gémes wrote: On 2017-02-21 23:10, Stefano Stabellini wrote: On Tue, 21 Feb 2017, Géza Gémes wrote: Hi, I've tried to

[Xen-devel] [xen-4.4-testing test] 106298: regressions - FAIL

2017-03-01 Thread osstest service owner
flight 106298 xen-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/106298/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xend-qemut-winxpsp3 15 guest-localmigrate/x10 fail in 106051 REGR. vs. 105835

[Xen-devel] [RAISIN] Allow-running-tests-as-non-root

2017-03-01 Thread Gémes Géza
Hi, The attached patch allows running the raisin tests as non-root user. Cheers, Geza >From 8a1227d96697a4d8be9130fd9b16404decbe7605 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?G=C3=A9za=20G=C3=A9mes?= Date: Wed, 1 Mar 2017 18:39:51 +0100 Subject: [PATCH] Allow running tests as non-root MIME-Ver

[Xen-devel] [linux-next test] 106294: tolerable FAIL

2017-03-01 Thread osstest service owner
flight 106294 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/106294/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-rtds 11 guest-start fail blocked in 106265 test-armhf-armhf-libvirt 13

Re: [Xen-devel] Virtual Interrupt Delivery

2017-03-01 Thread Konrad Rzeszutek Wilk
On Mon, Feb 27, 2017 at 09:13:29PM +0300, Dmitry Rockosov wrote: > Hi guys, > > Do you know when *recognized* Virtual Interrupt on VM-Entry will be > delivered if Virtual-Interrupt Delivery is enabled and interrupt delivery > is blocking by STI? This sounds like a good question to the Intel maint

Re: [Xen-devel] [PATCH v4 10/17] x86emul: add tables for 0f38 and 0f3a extension space

2017-03-01 Thread Andrew Cooper
On 01/03/17 16:11, Jan Beulich wrote: On 01.03.17 at 16:49, wrote: >> On 28/02/17 12:54, Jan Beulich wrote: >>> @@ -340,6 +342,28 @@ static const struct { >>> [0xff] = { ModRM } >>> }; >>> >>> +static const struct { >>> +uint8_t simd_size:5; >>> +uint8_t to_memory:1; >> Depend

Re: [Xen-devel] VLAPIC and Event channel relationship or how to map PIRQ to HVM guest

2017-03-01 Thread Konrad Rzeszutek Wilk
On Wed, Feb 22, 2017 at 12:41:16PM +0300, Dmitry Rockosov wrote: > Hello guys, > > Could someone help me with VLAPIC and Event channel relationship? I can't > find any good design overview for it. LAPIC is extensively described in the Intel SDM. The event channels are described in the header fil

Re: [Xen-devel] [PATCH v4] xen/arm: introduce vwfi parameter

2017-03-01 Thread Dario Faggioli
Il 01 Mar 2017 20:43, Stefano Stabellini ha scritto: Signed-off-by: Stefano Stabellini CC: dario.faggi...@citrix.com Reviewed-by: Dario Faggioli (And sorry for the formatting of this email.) Regards, Dario ___ Xen-devel mailing list Xen-devel@list

Re: [Xen-devel] [PATCH v4 05/17] x86emul: support MMX/SSE{, 2, 4a} insns with only register operands

2017-03-01 Thread Andrew Cooper
On 01/03/17 14:43, Jan Beulich wrote: On 01.03.17 at 15:36, wrote: >> On 28/02/17 12:52, Jan Beulich wrote: >>> @@ -2505,12 +2506,21 @@ x86_decode( >>> >>> opcode |= b | MASK_INSR(vex.pfx, X86EMUL_OPC_PFX_MASK); >>> >>> +if ( !(d & ModRM) ) >>> +

Re: [Xen-devel] [PATCH v4 02/17] x86emul: support MMX/SSE{, 2, 3} moves

2017-03-01 Thread Andrew Cooper
On 01/03/17 14:19, Jan Beulich wrote: On 01.03.17 at 14:59, wrote: >> On 28/02/17 12:50, Jan Beulich wrote: >>> Previously supported insns are being converted to the new model, and >>> several new ones are being added. >>> >>> To keep the stub handling reasonably simple, integrate SET_SSE_PRE

Re: [Xen-devel] [PATCH linux v3 2/9] x86/acpi: store ACPI ids from MADT for future usage

2017-03-01 Thread Thomas Gleixner
On Tue, 26 Jul 2016, Vitaly Kuznetsov wrote: So this patch made it's way into Linus tree via XEN w/o an ack or reviewed by from the x86 maintainers. Yes, we were on CC, but it's not that hard to ping the maintainers when they do not respond on a particular patch. The whole series ran under the c

Re: [Xen-devel] [iGVT-g] XenGT GPU virtualization

2017-03-01 Thread Konrad Rzeszutek Wilk
On Wed, Mar 01, 2017 at 10:36:13PM +0800, Zhiyuan Lv wrote: > Hi Konrad, > > On Tue, Feb 28, 2017 at 10:07:18AM -0500, Konrad Rzeszutek Wilk wrote: > > On Fri, Feb 24, 2017 at 02:25:27AM +, Wang, Hongbo wrote: > > > Intel XenGT has another maillist " igv...@lists.01.org" to discuss Intel > >

Re: [Xen-devel] kpartx for raisin hvm tests

2017-03-01 Thread Stefano Stabellini
On Wed, 1 Mar 2017, Gémes Géza wrote: > 2017-02-27 23:52 keltezéssel, Stefano Stabellini írta: > > On Wed, 22 Feb 2017, Géza Gémes wrote: > > > On 2017-02-21 23:10, Stefano Stabellini wrote: > > > > On Tue, 21 Feb 2017, Géza Gémes wrote: > > > > > Hi, > > > > > > > > > > I've tried to run the rais

[Xen-devel] [PATCH v4] xen/arm: introduce vwfi parameter

2017-03-01 Thread Stefano Stabellini
Introduce new Xen command line parameter called "vwfi", which stands for virtual wfi. The default is "trap": Xen traps guest wfi and wfe instructions. In the case of wfi, Xen calls vcpu_block on the guest vcpu; in the case of guest wfe, Xen calls vcpu_yield on the guest vcpu. The behavior can be ch

Re: [Xen-devel] [PATCH 09/28] ARM: GICv3 ITS: map device and LPIs to the ITS on physdev_op hypercall

2017-03-01 Thread Shanker Donthineni
Hi Julien, On 02/28/2017 12:29 PM, Julien Grall wrote: On 27/02/17 17:20, Andre Przywara wrote: Hi, Hi Andre, On 24/02/17 19:57, Shanker Donthineni wrote: Hi Julien, On 01/31/2017 10:18 AM, Julien Grall wrote: On 31/01/17 16:02, Jaggi, Manish wrote: On 1/31/2017 8:47 PM, Julien

Re: [Xen-devel] [PATCH v3] xen/arm: introduce vwfi parameter

2017-03-01 Thread Stefano Stabellini
On Wed, 1 Mar 2017, Dario Faggioli wrote: > On Tue, 2017-02-28 at 13:12 -0800, Stefano Stabellini wrote: > > --- a/docs/misc/xen-command-line.markdown > > +++ b/docs/misc/xen-command-line.markdown > > @@ -1638,6 +1638,20 @@ Note that if **watchdog** option is also > > specified vpmu will be turned

Re: [Xen-devel] [GSoC]about the task "Share a page in memory from the VM config file"

2017-03-01 Thread Stefano Stabellini
On Wed, 1 Mar 2017, Sky Liu wrote: > Hi, there. > I'm a student majoring in Information Security in HUST and I'm interested in > Xen's > GSoC project on adding page sharing support in the VM config file. > > I've been working in the CGCL lab in HUST for one year and a half, and my > interests >

[Xen-devel] [xen-unstable-smoke test] 106310: tolerable trouble: broken/fail/pass - PUSHED

2017-03-01 Thread osstest service owner
flight 106310 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/106310/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64 5 xen

Re: [Xen-devel] [DOC RFC] Heterogeneous Multi Processing Support in Xen

2017-03-01 Thread Stefano Stabellini
CC'ing Julien. On Wed, 1 Mar 2017, Dario Faggioli wrote: > On Wed, 2017-03-01 at 02:05 +0200, Anastassios Nanos wrote: > > On Wed, Dec 7, 2016 at 8:29 PM, Dario Faggioli > > wrote: > > > > > > % Heterogeneous Multi Processing Support in Xen > > > % Revision 1 > > > > > > [...] > > Hi all, > >

Re: [Xen-devel] [PATCH v4 01/17] x86emul: support most memory accessing MMX/SSE{, 2, 3} insns

2017-03-01 Thread Andrew Cooper
On 01/03/17 13:50, Jan Beulich wrote: > >> This seems rather inconsistent at the moment. > Does it? At least in this patch I can't spot an inconsistency. I meant in general across the current use of stubs, but perhaps that is just because of the transition to the new model. > >>> @@ -6159,6 +6551

[Xen-devel] [qemu-mainline test] 106291: regressions - FAIL

2017-03-01 Thread osstest service owner
flight 106291 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/106291/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-credit2 15 guest-start/debian.repeat fail REGR. vs. 106266 Regressions which

Re: [Xen-devel] [PATCH v4 17/17] x86emul: support SHA insns

2017-03-01 Thread Andrew Cooper
On 28/02/17 12:59, Jan Beulich wrote: > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] kpartx for raisin hvm tests

2017-03-01 Thread Gémes Géza
2017-02-27 23:52 keltezéssel, Stefano Stabellini írta: On Wed, 22 Feb 2017, Géza Gémes wrote: On 2017-02-21 23:10, Stefano Stabellini wrote: On Tue, 21 Feb 2017, Géza Gémes wrote: Hi, I've tried to run the raisin test suite, while pv tests pass the hvm tests fail. I've identified a number of

Re: [Xen-devel] [PATCH v4 15/17] x86emul: support PCLMULQDQ

2017-03-01 Thread Andrew Cooper
On 28/02/17 12:58, Jan Beulich wrote: > ... and its AVX equivalent. > > Signed-off-by: Jan Beulich > --- > v3: New. > > --- a/xen/arch/x86/x86_emulate/x86_emulate.c > +++ b/xen/arch/x86/x86_emulate/x86_emulate.c > @@ -393,6 +393,7 @@ static const struct { > [0x22] = { .simd_size = simd_none }

[Xen-devel] [xtf test] 106302: all pass - PUSHED

2017-03-01 Thread osstest service owner
flight 106302 xtf real [real] http://logs.test-lab.xenproject.org/osstest/logs/106302/ Perfect :-) All tests in this flight passed as required version targeted for testing: xtf b834586f982174aa0bc09daf17f1375908ad04af baseline version: xtf f3cbcfed8a591b5fd9ec99

Re: [Xen-devel] [DOC RFC] Heterogeneous Multi Processing Support in Xen

2017-03-01 Thread Dario Faggioli
On Wed, 2017-03-01 at 02:05 +0200, Anastassios Nanos wrote: > On Wed, Dec 7, 2016 at 8:29 PM, Dario Faggioli > wrote: > > > > % Heterogeneous Multi Processing Support in Xen > > % Revision 1 > > > > [...] > Hi all, > Hello, > We are sending a branch[1] for comments on an initial implementation

[Xen-devel] [linux-linus test] 106285: regressions - FAIL

2017-03-01 Thread osstest service owner
flight 106285 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/106285/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 59254 test-amd64-i386-fre

Re: [Xen-devel] [PATCH v4 14/17] x86emul: test coverage for SSE3/SSSE3/SSE4* insns

2017-03-01 Thread Andrew Cooper
On 28/02/17 12:57, Jan Beulich wrote: > Signed-off-by: Jan Beulich Acked-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v4 13/17] x86emul: support SSE4.2 insns

2017-03-01 Thread Andrew Cooper
On 28/02/17 12:56, Jan Beulich wrote: > ... and their AVX equivalents. > > Signed-off-by: Jan Beulich (Subject to the same (vex.opcx == vex_none) concern as the previous patch), Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen

Re: [Xen-devel] [PATCH 4/5] configure: detect presence of libxendevicemodel

2017-03-01 Thread Anthony PERARD
On Thu, Feb 23, 2017 at 02:53:54PM +, Paul Durrant wrote: > This patch adds code in configure to set CONFIG_XEN_CTRL_INTERFACE_VERSION > to a new value of 490 if libxendevicemodel is present in the build > environment. > > Signed-off-by: Paul Durrant > --- > Cc: Stefano Stabellini > Cc: Anth

Re: [Xen-devel] [PATCH v4 5/7] xen: credit2: group the runq manipulating functions.

2017-03-01 Thread Dario Faggioli
On Wed, 2017-03-01 at 16:41 +, George Dunlap wrote: > On 01/03/17 14:53, Dario Faggioli wrote: > > @@ -590,7 +590,7 @@ static s_time_t c2t(struct > > csched2_runqueue_data *rqd, s_time_t credit, struct c > >  } > >   > >  /* > > - * Runqueue related code > > + * Runqueue related code. > > You

Re: [Xen-devel] [PATCH v4 12/17] x86emul: support SSE4.1 insns

2017-03-01 Thread Andrew Cooper
On 28/02/17 12:56, Jan Beulich wrote: > @@ -6951,6 +7040,97 @@ x86_emulate( > fic.insn_bytes = PFX_BYTES + 3; > break; > > +case X86EMUL_OPC_66(0x0f38, 0x20): /* pmovsxbw xmm/m64,xmm */ > +case X86EMUL_OPC_66(0x0f38, 0x21): /* pmovsxbd xmm/m32,xmm */ > +case X86EMUL_

Re: [Xen-devel] [PATCH v4 7/7] xen/tools: tracing: Report next slice time when continuing as well as switching

2017-03-01 Thread George Dunlap
On 01/03/17 14:53, Dario Faggioli wrote: > We record trace information about the next timeslice when > switching to a different vcpu, but not when continuing to > run the same cpu: > > csched2:schedule cpu 9, rq# 1, idle, SMT idle, tickled > csched2:runq_candidate d0v3, 0 vcpus skipped, cpu 9 wa

Re: [Xen-devel] [ARM] SMC (and HVC) handling in hypervisor

2017-03-01 Thread Volodymyr Babchuk
Hello Julien, On 1 March 2017 at 18:09, Julien Grall wrote: > On 01/03/17 14:13, Volodymyr Babchuk wrote: This e-mail is sort of follow-up to the two threads: [1] (my thread about TEE interaction) and [2] (Edgar's thread regarding handling SMC calls in platform_hvc). I want to disc

Re: [Xen-devel] [PATCH 1/1] xen/arm: Add pl011 uart support in Xen for guest domains

2017-03-01 Thread Julien Grall
On 01/03/17 10:51, Bhupinder Thakur wrote: Hi Julien, Hi Bhupinder, On 1 March 2017 at 02:52, Konrad Rzeszutek Wilk wrote: However, the pl011 ring is similar to the console ring. So maybe we should re-use the console header rather than re-inventing the wheel. Can I include a xen public

Re: [Xen-devel] [PATCH v4 5/7] xen: credit2: group the runq manipulating functions.

2017-03-01 Thread George Dunlap
On 01/03/17 14:53, Dario Faggioli wrote: > So that they're all close among each other, and > also near to the comment describing the runqueue > organization (which is also moved). > > No functional change intended. > > Signed-off-by: Dario Faggioli > --- > Cc: George Dunlap > Cc: Anshul Makkar

Re: [Xen-devel] [PATCH RESEND RFC 0/8] Memory scrubbing from idle loop

2017-03-01 Thread Boris Ostrovsky
On 03/01/2017 11:27 AM, Jan Beulich wrote: On 01.03.17 at 17:14, wrote: >> On 03/01/2017 10:48 AM, George Dunlap wrote: >>> On 27/02/17 17:06, Boris Ostrovsky wrote: Since dirty pages are always at the tail of page lists we are not really searching the lists. As soon as a clean page

Re: [Xen-devel] [PATCH v4 3/7] xen: credit2: make accessor helpers inline functions instead of macros

2017-03-01 Thread George Dunlap
On 01/03/17 14:53, Dario Faggioli wrote: > There isn't any particular reason for the accessor helpers > to be macro, so turn them into 'static inline'-s, which are > better. > > Note that it is necessary to move the function definitions > below the structure declarations. > > No functional change

Re: [Xen-devel] [PATCH 6/7] x86/pagewalk: Consistently use guest_walk_*() helpers for translation

2017-03-01 Thread Jan Beulich
>>> On 01.03.17 at 17:33, wrote: > On 01/03/17 16:22, Jan Beulich wrote: > On 27.02.17 at 15:03, wrote: >>> --- a/xen/arch/x86/mm/hap/guest_walk.c >>> +++ b/xen/arch/x86/mm/hap/guest_walk.c >>> @@ -98,7 +98,7 @@ unsigned long hap_p2m_ga_to_gfn(GUEST_PAGING_LEVELS)( >>> /* Interpret the a

Re: [Xen-devel] [PATCH v3] displif: add ABI for para-virtual display

2017-03-01 Thread Oleksandr Andrushchenko
Hi, Konrad! On 02/17/2017 07:33 PM, Oleksandr Andrushchenko wrote: On 02/17/2017 06:33 PM, Konrad Rzeszutek Wilk wrote: On Thu, Feb 16, 2017 at 10:36:01AM +0200, Oleksandr Andrushchenko wrote: On 02/15/2017 11:33 PM, Konrad Rzeszutek Wilk wrote: .snip.. I will define 2 sections: *--

Re: [Xen-devel] [PATCH 6/7] x86/pagewalk: Consistently use guest_walk_*() helpers for translation

2017-03-01 Thread Andrew Cooper
On 01/03/17 16:22, Jan Beulich wrote: On 27.02.17 at 15:03, wrote: >> --- a/xen/arch/x86/mm/hap/guest_walk.c >> +++ b/xen/arch/x86/mm/hap/guest_walk.c >> @@ -98,7 +98,7 @@ unsigned long hap_p2m_ga_to_gfn(GUEST_PAGING_LEVELS)( >> /* Interpret the answer */ >> if ( missing == 0 ) >>

Re: [Xen-devel] [PATCH 0/7] Fixes to pagetable handling

2017-03-01 Thread Andrew Cooper
On 01/03/17 16:24, Jan Beulich wrote: On 27.02.17 at 15:03, wrote: >> Outstanding hardware issues discovered include: >> 1) There is an observable delay in AMD Fam 10h processors between loading a >> segment selector, and the results of the LDT/GDT memory access being >> visible i

Re: [Xen-devel] [PATCH RESEND RFC 0/8] Memory scrubbing from idle loop

2017-03-01 Thread Jan Beulich
>>> On 01.03.17 at 17:14, wrote: > On 03/01/2017 10:48 AM, George Dunlap wrote: >> On 27/02/17 17:06, Boris Ostrovsky wrote: >>> Since dirty pages are always at the tail of page lists we are not really >>> searching the lists. As soon as a clean page is found (starting from the >>> tail) we can st

Re: [Xen-devel] [PATCH 0/7] Fixes to pagetable handling

2017-03-01 Thread Jan Beulich
>>> On 27.02.17 at 15:03, wrote: > Outstanding hardware issues discovered include: > 1) There is an observable delay in AMD Fam 10h processors between loading a > segment selector, and the results of the LDT/GDT memory access being > visible in the pagetables (via the Access bits being

Re: [Xen-devel] [PATCH 3/5] xen: create wrappers for all other uses of xc_hvm_XXX() functions

2017-03-01 Thread Paul Durrant
> -Original Message- > From: Anthony PERARD [mailto:anthony.per...@citrix.com] > Sent: 01 March 2017 16:14 > To: Paul Durrant > Cc: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org; Stefano > Stabellini ; Paolo Bonzini ; > Richard Henderson ; Eduardo Habkost > ; Michael S. Tsirkin >

Re: [Xen-devel] [PATCH 6/7] x86/pagewalk: Consistently use guest_walk_*() helpers for translation

2017-03-01 Thread Jan Beulich
>>> On 27.02.17 at 15:03, wrote: > --- a/xen/arch/x86/mm/hap/guest_walk.c > +++ b/xen/arch/x86/mm/hap/guest_walk.c > @@ -98,7 +98,7 @@ unsigned long hap_p2m_ga_to_gfn(GUEST_PAGING_LEVELS)( > /* Interpret the answer */ > if ( missing == 0 ) > { > -gfn_t gfn = guest_l1e_get_gf

Re: [Xen-devel] [ARM] SMC (and HVC) handling in hypervisor

2017-03-01 Thread Julien Grall
Hi Volodymyr, On 01/03/17 16:09, Julien Grall wrote: On 01/03/17 14:13, Volodymyr Babchuk wrote: Hi, Julien Hi Volodymyr, On 28 February 2017 at 15:51, Julien Grall wrote: This e-mail is sort of follow-up to the two threads: [1] (my thread about TEE interaction) and [2] (Edgar's thread r

Re: [Xen-devel] [PATCH 3/5] xen: create wrappers for all other uses of xc_hvm_XXX() functions

2017-03-01 Thread Anthony PERARD
On Thu, Feb 23, 2017 at 02:53:53PM +, Paul Durrant wrote: > This patch creates inline wrapper functions in xen_common.h for all open > coded calls to xc_hvm_XXX() functions outside of xen_common.h so that use > of xen_xc can be made implicit. This again is in preparation for the move > to using

Re: [Xen-devel] [PATCH RESEND RFC 0/8] Memory scrubbing from idle loop

2017-03-01 Thread Boris Ostrovsky
On 03/01/2017 10:48 AM, George Dunlap wrote: > On 27/02/17 17:06, Boris Ostrovsky wrote: Briefly, the new algorithm places dirty pages at the end of heap's page list for each node/zone/order to avoid having to scan full list while searching for dirty pages. One processor form e

Re: [Xen-devel] [PATCH v4 10/17] x86emul: add tables for 0f38 and 0f3a extension space

2017-03-01 Thread Jan Beulich
>>> On 01.03.17 at 16:49, wrote: > On 28/02/17 12:54, Jan Beulich wrote: >> @@ -340,6 +342,28 @@ static const struct { >> [0xff] = { ModRM } >> }; >> >> +static const struct { >> +uint8_t simd_size:5; >> +uint8_t to_memory:1; > > Depending on how often it is used, what about short

Re: [Xen-devel] [ARM] SMC (and HVC) handling in hypervisor

2017-03-01 Thread Julien Grall
On 01/03/17 14:13, Volodymyr Babchuk wrote: Hi, Julien Hi Volodymyr, On 28 February 2017 at 15:51, Julien Grall wrote: This e-mail is sort of follow-up to the two threads: [1] (my thread about TEE interaction) and [2] (Edgar's thread regarding handling SMC calls in platform_hvc). I want to

Re: [Xen-devel] [PATCH v4 11/17] x86emul: support SSSE3 insns

2017-03-01 Thread Andrew Cooper
On 28/02/17 12:55, Jan Beulich wrote: > ... and their AVX equivalents. > > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 1/3] x86: remove PVHv1 code

2017-03-01 Thread Elena Ufimtseva
On Tue, Feb 28, 2017 at 05:39:39PM +, Roger Pau Monne wrote: > This removal applies to both the hypervisor and the toolstack side of PVHv1. > > Note that on the toolstack side there's one hiccup: on xl the "pvh" > configuration option is translated to builder="hvm", > device_model_version="non

Re: [Xen-devel] [PATCH 5/7] x86/shadow: Use the pagewalk reserved bits helpers

2017-03-01 Thread Jan Beulich
>>> On 27.02.17 at 15:03, wrote: > The shadow logic should never create a shadow of a guest PTE which contains > reserved bits from the guests point of view. Such a shadowed entry might not > cause #PF[RSVD] when walked by hardware, thus won't behave architecturally > from the guests point of vie

Re: [Xen-devel] [PATCH 4/7] x86/hvm: Adjust hvm_nx_enabled() to match how Xen behaves

2017-03-01 Thread Jan Beulich
>>> On 27.02.17 at 15:03, wrote: > On Intel hardware, EFER is not fully switched between host and guest > contexts. > In practice, this means that Xen's EFER.NX setting leaks into guest context, > and influences the behaviour of the hardware pagewalker. > > When servicing a pagefault, Xen's mode

[Xen-devel] [ovmf test] 106287: regressions - FAIL

2017-03-01 Thread osstest service owner
flight 106287 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/106287/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963 test-amd64-amd64-xl-qemuu-

Re: [Xen-devel] [PATCH 3/7] x86/pagewalk: Helpers for reserved bit handling

2017-03-01 Thread Jan Beulich
>>> On 27.02.17 at 15:03, wrote: > -static inline int > -guest_supports_1G_superpages(struct vcpu *v) > +static inline bool guest_has_pse36(const struct vcpu *v) > +{ > + /* No support for 2-level PV guests. */ > +return is_pv_vcpu(v) ? 0 : paging_mode_hap(v->domain); Considering the retu

Re: [Xen-devel] [PATCH v4 10/17] x86emul: add tables for 0f38 and 0f3a extension space

2017-03-01 Thread Andrew Cooper
On 28/02/17 12:54, Jan Beulich wrote: > Convert the few existing opcodes so far supported. > > Signed-off-by: Jan Beulich > --- > v3: New. > > --- a/xen/arch/x86/x86_emulate/x86_emulate.c > +++ b/xen/arch/x86/x86_emulate/x86_emulate.c > @@ -43,6 +43,8 @@ > #define SrcMask (7<<3) > /* Generic

Re: [Xen-devel] [PATCH RESEND RFC 0/8] Memory scrubbing from idle loop

2017-03-01 Thread George Dunlap
On 27/02/17 17:06, Boris Ostrovsky wrote: >>> Briefly, the new algorithm places dirty pages at the end of heap's page list >>> for each node/zone/order to avoid having to scan full list while searching >>> for dirty pages. One processor form each node checks whether the node has >>> any >>> dirty

Re: [Xen-devel] [PATCH v4 0/7] xen: credit2: improve style, and tracing; fix two bugs

2017-03-01 Thread Dario Faggioli
On Wed, 2017-03-01 at 15:52 +0100, Dario Faggioli wrote: > Dario Faggioli (7): >   xen: credit2: always mark a tickled pCPU as... tickled! >   xen: credit2: don't miss accounting while doing a credit reset. > And these two being bugfixes, I request them to be backported to Xen 4.7 (but not

Re: [Xen-devel] [PATCH v1 1/2] x86/vvmx: check vmcs address in vmread/vmwrite

2017-03-01 Thread Jan Beulich
>>> On 01.03.17 at 16:23, wrote: > On Wed, 2017-03-01 at 07:28 -0700, Jan Beulich wrote: >> > > > On 01.03.17 at 15:22, wrote: >> > >> > On Wed, 2017-03-01 at 07:04 -0700, Jan Beulich wrote: >> > > > > > On 01.03.17 at 14:44, wrote: >> > > > >> > > > Additionally, it would be painful to return

Re: [Xen-devel] [PATCH v2 1/3] x86: remove PVHv1 code

2017-03-01 Thread Ian Jackson
Roger Pau Monne writes ("Re: [PATCH v2 1/3] x86: remove PVHv1 code"): > On Wed, Mar 01, 2017 at 02:51:33PM +, Ian Jackson wrote: > > But config files are supposed to be written by nonprogrammers (or by > > toolstack or orchestration system programmers). > > OK, I can be convinced that this is

[Xen-devel] [xen-unstable test] 106283: regressions - trouble: blocked/broken/fail/pass

2017-03-01 Thread osstest service owner
flight 106283 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/106283/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemuu-rhel6hvm-intel 6 xen-boot fail REGR. vs. 105933 test-amd64-i386-xl

Re: [Xen-devel] [PATCH 2/5] xen: rename xen_modified_memory() to xen_hvm_modified_memory()

2017-03-01 Thread Anthony PERARD
On Thu, Feb 23, 2017 at 02:53:52PM +, Paul Durrant wrote: > This patch is a purely cosmetic change that avoids a name collision in > a subsequent patch. > > Signed-off-by: Paul Durrant Reviewed-by: Anthony PERARD -- Anthony PERARD ___ Xen-devel

Re: [Xen-devel] [PATCH v2 1/3] x86: remove PVHv1 code

2017-03-01 Thread Roger Pau Monne
On Wed, Mar 01, 2017 at 02:51:33PM +, Ian Jackson wrote: > Roger Pau Monne writes ("Re: [PATCH v2 1/3] x86: remove PVHv1 code"): > > It's not just the CPU extensions, we are also providing it with a > > local APIC and ACPI tables, > > The host and guest system administrators do not care about

Re: [Xen-devel] [PATCH v1 1/2] x86/vvmx: check vmcs address in vmread/vmwrite

2017-03-01 Thread Sergey Dyasli
On Wed, 2017-03-01 at 07:28 -0700, Jan Beulich wrote: > > > > On 01.03.17 at 15:22, wrote: > > > > On Wed, 2017-03-01 at 07:04 -0700, Jan Beulich wrote: > > > > > > On 01.03.17 at 14:44, wrote: > > > > > > > > Additionally, it would be painful to return the correct error value > > > > all the w

Re: [Xen-devel] [PATCH 1/5] xen: make use of xen_xc implicit in xen_common.h inlines

2017-03-01 Thread Anthony PERARD
On Thu, Feb 23, 2017 at 02:53:51PM +, Paul Durrant wrote: > Doing this will make the transition to using the new libxendevicemodel > interface less intrusive on the callers of these functions, since using > the new library will require a change of handle. > > NOTE: The patch also moves the 'ex

Re: [Xen-devel] [PATCH 2/7] x86/shadow: Try to correctly identify implicit supervisor accesses

2017-03-01 Thread Jan Beulich
>>> On 27.02.17 at 15:03, wrote: > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

[Xen-devel] [PATCH v4 2/2] x86/vpmu: Disable VPMU if guest's CPUID indicates no PMU support

2017-03-01 Thread Boris Ostrovsky
When toolstack overrides Intel CPUID leaf 0xa's PMU version with an invalid value VPMU should not be available to the guest. Signed-off-by: Boris Ostrovsky Reviewed-by: Jan Beulich --- xen/arch/x86/cpu/vpmu_intel.c | 4 xen/arch/x86/domctl.c | 14 ++ xen/include/asm-x8

  1   2   3   >