[Xen-devel] Xen: ARM: Support for mapping ECAM PCIe Config Space Specified In Static ACPI Table

2016-12-14 Thread Jiandi An
Hi Guys, Xen currently doesn't map ECAM space specified in static ACPI table. Seeking opinion on how this should be handled properly. Each root complex ECAM region takes up 64K 4K pages (256MB). For some platforms there might be multiple root complexes. Is the plan to map all at once? Juli

Re: [Xen-devel] SVM/VMX and Interrupt Shadows

2016-12-14 Thread Jan Beulich
>>> On 14.12.16 at 08:29, wrote: >> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] >> Sent: Wednesday, December 14, 2016 3:25 AM >> Executing a sti while singlestepping is active currently causes a >> VMEntry failure, because the #DB is still intercepted, but on re-entry, >> the sti inter

Re: [Xen-devel] SVM/VMX and Interrupt Shadows

2016-12-14 Thread Jan Beulich
>>> On 13.12.16 at 20:24, wrote: > Experimentally, on both Intel and AMD hardware, the mov_ss shadow > inhibits #DB and the VMexit caused by its interception, whereas the sti > shadow doesn't inhibit #DB. Therefore, my planned fix for VT-x is to > unconditionally clobber the sti shadow if we inte

[Xen-devel] Xen: ARM: Support to map mmio region specified in static ACPI tables

2016-12-14 Thread Jiandi An
Hi Guys, Xen currently does not handle mapping mmio regions specified in standard static ACPI tables such as BERT, TPM2, GT block, IORT, HEST, etc. There has been some initial discussions on using whitelist and leave it up to the individual drivers in dom0 who need the particular region in par

[Xen-devel] [xen-4.6-testing test] 103209: tolerable FAIL - PUSHED

2016-12-14 Thread osstest service owner
flight 103209 xen-4.6-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/103209/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail in 103159 pass in 103209 test-a

Re: [Xen-devel] [xen-unstable-smoke test] 103306: regressions - FAIL

2016-12-14 Thread Cedric Bosdonnat
Hello Wei, On Wed, 2016-12-14 at 07:52 +, Wei Liu wrote: > On Wed, Dec 14, 2016 at 06:24:15AM +, osstest service owner wrote: > > flight 103306 xen-unstable-smoke real [real] > > http://logs.test-lab.xenproject.org/osstest/logs/103306/ > > > > Regressions :-( > > > > Tests which did not

[Xen-devel] [linux-3.18 bisection] complete test-amd64-amd64-xl-qemut-win7-amd64

2016-12-14 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-amd64-xl-qemut-win7-amd64 testid xen-boot Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/qemu-xen-trad

[Xen-devel] [PATCH v5] libxl: QED disks support

2016-12-14 Thread Cédric Bosdonnat
Qdisk supports qcow and qcow2, extend it to also support qed disk format. Signed-off-by: Cédric Bosdonnat Acked-by: Ian Jackson Acked-by: Wei Liu --- v2: * Add qed to the list for possible format values in xl-disk-configuration.txt * Add LIBXL_HAVE_QED v3: * Remove the qed: obsolete

Re: [Xen-devel] Future x86 emulator direction

2016-12-14 Thread Razvan Cojocaru
On 12/13/2016 07:10 PM, Andrew Cooper wrote: > On 13/12/16 15:58, Razvan Cojocaru wrote: >> Hello, and first of all thanks for the discussion! >> >>> Think of it a bit more like introducing a new action emulator (name >>> definitely subject to improvement), which implements things such as >>> wrmsr

[Xen-devel] [xen-unstable-smoke test] 103317: regressions - FAIL

2016-12-14 Thread osstest service owner
flight 103317 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/103317/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-libvirt 5 libvirt-buildfail REGR. vs. 103284 Tests which

[Xen-devel] [ovmf baseline-only test] 68217: all pass

2016-12-14 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68217 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68217/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 94a1bc1212edf521b7c96bfb9dc653818c95bec7 baseline v

Re: [Xen-devel] [PATCH V6] x86/vm_event: Added support for VM_EVENT_REASON_INTERRUPT

2016-12-14 Thread Jan Beulich
>>> On 13.12.16 at 15:50, wrote: > Added support for a new event type, VM_EVENT_REASON_INTERRUPT, > which is now fired in a one-shot manner when enabled via the new > VM_EVENT_FLAG_GET_NEXT_INTERRUPT vm_event response flag. > The patch also fixes the behaviour of the xc_hvm_inject_trap() > hyperca

Re: [Xen-devel] [PATCH V6] x86/vm_event: Added support for VM_EVENT_REASON_INTERRUPT

2016-12-14 Thread Razvan Cojocaru
On 12/14/2016 11:04 AM, Jan Beulich wrote: On 13.12.16 at 15:50, wrote: >> Added support for a new event type, VM_EVENT_REASON_INTERRUPT, >> which is now fired in a one-shot manner when enabled via the new >> VM_EVENT_FLAG_GET_NEXT_INTERRUPT vm_event response flag. >> The patch also fixes the

Re: [Xen-devel] Future x86 emulator direction

2016-12-14 Thread Jan Beulich
>>> On 14.12.16 at 09:53, wrote: > On 12/13/2016 07:10 PM, Andrew Cooper wrote: >> Do you have stats on which instructions you most frequently have to >> singlestep because of lack of emulator support, or is the spread >> essentially random? > > Here's what I've gathered just now with nothing mor

Re: [Xen-devel] [PATCH v4 4/5] x86/PV: use generic emulator for privileged instruction handling

2016-12-14 Thread Andrew Cooper
On 14/12/2016 07:35, Jan Beulich wrote: On 13.12.16 at 17:53, wrote: >> On 13/12/16 11:28, Jan Beulich wrote: >>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c >>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c >>> @@ -1185,7 +1185,7 @@ static int ioport_access_check( >>> >>> fail_if(ops-

[Xen-devel] [PATCH] x86emul: support fencing insns

2016-12-14 Thread Jan Beulich
Signed-off-by: Jan Beulich --- a/xen/arch/x86/x86_emulate/x86_emulate.c +++ b/xen/arch/x86/x86_emulate/x86_emulate.c @@ -5190,8 +5190,26 @@ x86_emulate( case X86EMUL_OPC(0x0f, 0xae): case X86EMUL_OPC_66(0x0f, 0xae): /* Grp15 */ switch ( modrm_reg & 7 ) { -case 7: /*

[Xen-devel] [PATCH] x86emul: support {RD,WR}{F,G}SBASE

2016-12-14 Thread Jan Beulich
Signed-off-by: Jan Beulich --- a/xen/arch/x86/x86_emulate/x86_emulate.c +++ b/xen/arch/x86/x86_emulate/x86_emulate.c @@ -432,6 +432,7 @@ typedef union { #define CR4_OSFXSR (1<<9) #define CR4_OSXMMEXCPT (1<<10) #define CR4_UMIP (1<<11) +#define CR4_FSGSBASE (1<<16) #define CR4_OSXS

[Xen-devel] [libvirt test] 103263: regressions - FAIL

2016-12-14 Thread osstest service owner
flight 103263 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/103263/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-qcow2 6 xen-boot fail REGR. vs. 103065 test-armhf-armhf-libvir

[Xen-devel] [PATCH 0/3] x86emul: support more SSE/AVX moves

2016-12-14 Thread Jan Beulich
I think this then completes the set of simple move instructions the emulator supports; the next step would then be to fully support the SSEn/AVXn instruction sets. 1: support load forms of {,V}MOV{D,Q} 2: support {,V}LDDQU 3: support {,V}MOVNTDQA Signed-off-by: Jan Beulich

[Xen-devel] [distros-debian-squeeze test] 68218: tolerable FAIL

2016-12-14 Thread Platform Team regression test user
flight 68218 distros-debian-squeeze real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68218/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-amd64-squeeze-netboot-pygrub 9 debian-di-install fail like 68168 test-amd64-

[Xen-devel] [PATCH 1/3] x86emul: support load forms of {, V}MOV{D, Q}

2016-12-14 Thread Jan Beulich
Signed-off-by: Jan Beulich --- a/tools/tests/x86_emulator/test_x86_emulator.c +++ b/tools/tests/x86_emulator/test_x86_emulator.c @@ -823,6 +823,29 @@ int main(int argc, char **argv) else printf("skipped\n"); +printf("%-40s", "Testing movq 32(%ecx),%xmm1..."); +if ( stack_e

[Xen-devel] [PATCH 2/3] x86emul: support {,V}LDDQU

2016-12-14 Thread Jan Beulich
Also take the opportunity and adjust the vmovdqu test case the new one here has been cloned from: To zero a ymm register we don't need to go through hoops, as 128-bit AVX insns zero the upper portion of the destination register, and in the disabled AVX2 code there was a wrong YMM register used. Si

[Xen-devel] [PATCH 3/3] x86emul: support {,V}MOVNTDQA

2016-12-14 Thread Jan Beulich
Signed-off-by: Jan Beulich --- a/tools/tests/x86_emulator/test_x86_emulator.c +++ b/tools/tests/x86_emulator/test_x86_emulator.c @@ -1608,6 +1608,74 @@ int main(int argc, char **argv) goto fail; #if 0 /* Don't use AVX2 instructions for now */ asm ( "vpcmpeqb %%ymm2, %%ymm2,

[Xen-devel] [PATCH V7] x86/vm_event: Added support for VM_EVENT_REASON_INTERRUPT

2016-12-14 Thread Razvan Cojocaru
Added support for a new event type, VM_EVENT_REASON_INTERRUPT, which is now fired in a one-shot manner when enabled via the new VM_EVENT_FLAG_GET_NEXT_INTERRUPT vm_event response flag. The patch also fixes the behaviour of the xc_hvm_inject_trap() hypercall, which would lead to non-architectural in

[Xen-devel] [PATCH v2 1/4] vvmx: set vmxon_region_pa of vcpu out of VMX operation to an invalid address

2016-12-14 Thread Haozhong Zhang
nvmx_handle_vmxon() previously checks whether a vcpu is in VMX operation by comparing its vmxon_region_pa with GPA 0. However, 0 is also a valid VMXON region address. If L1 hypervisor had set the VMXON region address to 0, the check in nvmx_handle_vmxon() will be skipped. Fix this problem by using

[Xen-devel] [PATCH v2 4/4] nestedhvm: replace VMCX_EADDR by INVALID_PADDR

2016-12-14 Thread Haozhong Zhang
... because INVALID_PADDR is a more general one. Suggested-by: Jan Beulich Signed-off-by: Haozhong Zhang --- xen/arch/x86/hvm/nestedhvm.c | 2 +- xen/arch/x86/hvm/svm/nestedsvm.c | 18 +- xen/arch/x86/hvm/svm/vmcb.c | 2 +- xen/arch/x86/hvm/vmx/vvmx.c | 16 ++

[Xen-devel] [PATCH v2 2/4] vvmx: return VMfail to L1 if L1 vmxon is executed in VMX operation

2016-12-14 Thread Haozhong Zhang
According to Intel SDM, section "VMXON - Enter VMX Operation", a VMfail should be returned to L1 hypervisor if L1 vmxon is executed in VMX operation, rather than just print a warning message. Signed-off-by: Haozhong Zhang Reviewed-by: Andrew Cooper Acked-by: Kevin Tian --- xen/arch/x86/hvm/vmx

[Xen-devel] [PATCH v2 0/4] vvmx: fix L1 vmxon

2016-12-14 Thread Haozhong Zhang
This patchset fixes bugs and adds missing checks in nvmx_handle_vmxon(), in order to make it more consistent to Intel SDM (section "VMXON - Enter VMX Operation" in Vol 3). Changes in v2: * Add necessary 'const' in patch 1. (Andrew Cooper) * Use the existing INVALID_PADDR rather than introducing

[Xen-devel] [PATCH v2 3/4] vvmx: check the operand of L1 vmxon

2016-12-14 Thread Haozhong Zhang
Check whether the operand of L1 vmxon is a valid VMXON region address and whether the VMXON region at that address contains a valid revision ID. Signed-off-by: Haozhong Zhang Reviewed-by: Andrew Cooper Reviewed-by: Konrad Rzeszutek Wilk Acked-by: Kevin Tian --- xen/arch/x86/hvm/vmx/vvmx.c | 1

Re: [Xen-devel] [PATCH v2 4/4] nestedhvm: replace VMCX_EADDR by INVALID_PADDR

2016-12-14 Thread Jan Beulich
>>> On 14.12.16 at 11:11, wrote: > ... because INVALID_PADDR is a more general one. > > Suggested-by: Jan Beulich > Signed-off-by: Haozhong Zhang Reviewed-by: Jan Beulich Thanks for doing this! Jan ___ Xen-devel mailing list Xen-devel@lists.xen.

Re: [Xen-devel] [PATCH v2 4/4] nestedhvm: replace VMCX_EADDR by INVALID_PADDR

2016-12-14 Thread Haozhong Zhang
On 12/14/16 18:11 +0800, Haozhong Zhang wrote: ... because INVALID_PADDR is a more general one. Suggested-by: Jan Beulich Signed-off-by: Haozhong Zhang --- xen/arch/x86/hvm/nestedhvm.c | 2 +- xen/arch/x86/hvm/svm/nestedsvm.c | 18 +- xen/arch/x86/hvm/svm/vmcb.c | 2 +-

Re: [Xen-devel] Future x86 emulator direction

2016-12-14 Thread Andrew Cooper
On 14/12/16 08:53, Razvan Cojocaru wrote: > On 12/13/2016 07:10 PM, Andrew Cooper wrote: >> On 13/12/16 15:58, Razvan Cojocaru wrote: >>> Hello, and first of all thanks for the discussion! >>> Think of it a bit more like introducing a new action emulator (name definitely subject to improv

Re: [Xen-devel] SVM/VMX and Interrupt Shadows

2016-12-14 Thread Andrew Cooper
On 14/12/16 07:29, Tian, Kevin wrote: >> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] >> Sent: Wednesday, December 14, 2016 3:25 AM >> >> Hello, >> >> All of this came about while reviewing some of Jans improvements to the >> x86 instruction emulator. >> >> It turns out that the XSA-156 /

[Xen-devel] [xen-unstable-coverity test] 103327: all pass - PUSHED

2016-12-14 Thread osstest service owner
flight 103327 xen-unstable-coverity real [real] http://logs.test-lab.xenproject.org/osstest/logs/103327/ Perfect :-) All tests in this flight passed as required version targeted for testing: xen fc9229c4bb35c5474fbc67f78e628dcbcc90afc5 baseline version: xen cb6a

Re: [Xen-devel] [PATCH v5] libxl: QED disks support

2016-12-14 Thread Wei Liu
On Wed, Dec 14, 2016 at 09:48:57AM +0100, Cédric Bosdonnat wrote: > Qdisk supports qcow and qcow2, extend it to also support qed disk > format. > > Signed-off-by: Cédric Bosdonnat > Acked-by: Ian Jackson > Acked-by: Wei Liu This patch was pushed yesterday to staging branch. To check whether a

[Xen-devel] [PATCH] x86/emul: Further simplify DstBitBase handling

2016-12-14 Thread Andrew Cooper
The masking of src.val is common to both paths. Move it later and simplify the entry condition for adjusting the memory operand. Signed-off-by: Andrew Cooper --- CC: Jan Beulich --- xen/arch/x86/x86_emulate/x86_emulate.c | 11 +-- 1 file changed, 5 insertions(+), 6 deletions(-) diff -

[Xen-devel] [PATCH v4 04/24] x86: refactor psr: implement CPU init and free flow.

2016-12-14 Thread Yi Sun
This patch implements the CPU init and free flow including L3 CAT initialization and feature list free. Per this patch, you can see how callback functions work and how the feature list is handled. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c | 179 +++

[Xen-devel] [PATCH v4 02/24] x86: refactor psr: remove L3 CAT/CDP codes.

2016-12-14 Thread Yi Sun
The current cache allocation codes in psr.c do not consider future features addition and are not friendly to extend. To make psr.c be more flexible to add new features and fulfill the program principle, open for extension but closed for modification, we have to refactor the psr.c: 1. Analyze cache

[Xen-devel] [PATCH v4 05/24] x86: refactor psr: implement Domain init/free and schedule flows.

2016-12-14 Thread Yi Sun
This patch implements the Domain init/free and schedule flows. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c | 60 +- 1 file changed, 59 insertions(+), 1 deletion(-) diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c index fa9bc32..746c90e 10

[Xen-devel] [PATCH v4 03/24] x86: refactor psr: implement main data structures.

2016-12-14 Thread Yi Sun
To construct an extendible framework, we need analyze PSR features and abstract the common things and feature specific things. Then, encapsulate them into different data structures. By analyzing PSR features, we can get below map. +--+--+--+ ->| Dom0 | Dom

[Xen-devel] [PATCH v4 06/24] x86: refactor psr: implement get hw info flow.

2016-12-14 Thread Yi Sun
This patch implements get HW info flow including L3 CAT callback function. It also changes sysctl interface to make it more general. With this patch, 'psr-hwinfo' can work for L3 CAT. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c| 48 --- xen/

[Xen-devel] [PATCH v4 00/24] Enable L2 Cache Allocation Technology & Refactor psr.c

2016-12-14 Thread Yi Sun
Hi all, We plan to bring a new PSR (Platform Shared Resource) feature called Intel L2 Cache Allocation Technology (L2 CAT) to Xen. Besides the L2 CAT implementaion, we refactor the psr.c to make it more flexible to add new features and fulfill the principle, open for extension but closed for modi

[Xen-devel] [PATCH v4 01/24] docs: create L2 Cache Allocation Technology (CAT) feature document

2016-12-14 Thread Yi Sun
This patch creates L2 CAT feature document in doc/features/. It describes details of L2 CAT. Signed-off-by: Yi Sun --- docs/features/intel_psr_l2_cat.pandoc | 347 ++ 1 file changed, 347 insertions(+) create mode 100644 docs/features/intel_psr_l2_cat.pandoc diff

[Xen-devel] [PATCH v4 11/24] x86: refactor psr: set value: implement cos id allocation flow.

2016-12-14 Thread Yi Sun
Continue with previous patches, if fail to find a COS ID, we need allocate a new COS ID for domain. Only COS ID that ref[COS_ID] is 1 or 0 can be allocated to input a new set feature values. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c | 105 -

[Xen-devel] [PATCH v4 07/24] x86: refactor psr: implement get value flow.

2016-12-14 Thread Yi Sun
This patch implements get value flow including L3 CAT callback function. It also changes domctl interface to make it more general. With this patch, 'psr-cat-show' can work for L3 CAT. Signed-off-by: Yi Sun --- xen/arch/x86/domctl.c | 18 +- xen/arch/x86/psr.c| 39 ++

[Xen-devel] [PATCH v4 08/24] x86: refactor psr: set value: implement framework.

2016-12-14 Thread Yi Sun
As set value flow is the most complicated one in psr, it will be divided to some patches to make things clearer. This patch implements the set value framework to show a whole picture firstly. It also changes domctl interface to make it more general. To make the set value flow be general and can s

[Xen-devel] [PATCH v4 12/24] x86: refactor psr: set value: implement write msr flow.

2016-12-14 Thread Yi Sun
Continue with previous patches, we have got all features values and COS ID to set. Then, we write MSRs of all features except the setting value is same as original value. Till now, set value process is completed. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c | 78

[Xen-devel] [PATCH v4 09/24] x86: refactor psr: set value: assemble features value array.

2016-12-14 Thread Yi Sun
Only can one COS ID be used by one domain at one time. That means all enabled features' COS registers at this COS ID are valid for this domain at that time. When user updates a feature's value, we need make sure all other features' values are not affected. So, we firstly need assemble an array whi

[Xen-devel] [PATCH v4 10/24] x86: refactor psr: set value: implement cos finding flow.

2016-12-14 Thread Yi Sun
Continue with previous patch, we can try to find if there is a COS ID on which all features' COS registers values are same as the array assembled before. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c | 111 - 1 file changed, 110 insertions(+), 1

[Xen-devel] [PATCH v4 13/24] x86: refactor psr: implement CPU init and free flow for CDP.

2016-12-14 Thread Yi Sun
This patch implements the CPU init and free flow for CDP including L3 CDP initialization callback function. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c | 101 +++-- 1 file changed, 98 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/psr.c

[Xen-devel] [PATCH v4 20/24] x86: L2 CAT: implement set value flow.

2016-12-14 Thread Yi Sun
This patch implements L2 CAT set value related callback functions and domctl interface. Signed-off-by: Yi Sun --- xen/arch/x86/domctl.c | 6 ++ xen/arch/x86/psr.c | 132 +++- xen/include/asm-x86/msr-index.h | 1 + xen/include/public/

[Xen-devel] [PATCH v4 17/24] x86: L2 CAT: implement CPU init and free flow.

2016-12-14 Thread Yi Sun
This patch implements the CPU init and free flow for L2 CAT including L2 CAT initialization callback function. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c| 76 +++ xen/include/asm-x86/psr.h | 1 + 2 files changed, 77 insertions(+) diff --git

[Xen-devel] [PATCH v4 22/24] tools: L2 CAT: support show cbm for L2 CAT.

2016-12-14 Thread Yi Sun
This patch implements changes in xl/xc changes to support showing CBM of L2 CAT. The new level option is introduced to original CAT showing command in order to show CBM for specified level CAT. - 'xl psr-cat-show' is updated to show CBM of a domain according to input cache level. Examples: root

[Xen-devel] [PATCH v4 14/24] x86: refactor psr: implement get hw info flow for CDP.

2016-12-14 Thread Yi Sun
This patch implements get HW info flow for CDP including L3 CDP callback function. It also changes sysctl function to make it work for CDP. With this patch, 'psr-hwinfo' can work for L3 CDP. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c| 16 xen/arch/x86/sysctl.c | 24 +

[Xen-devel] [PATCH v4 18/24] x86: L2 CAT: implement get hw info flow.

2016-12-14 Thread Yi Sun
This patch implements get HW info flow for L2 CAT including L2 CAT callback function. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c | 14 ++ xen/arch/x86/sysctl.c | 15 +++ xen/include/asm-x86/psr.h | 1 + xen/include/public/sysctl.h | 6 ++ 4 files

[Xen-devel] [PATCH v4 15/24] x86: refactor psr: implement get value flow for CDP.

2016-12-14 Thread Yi Sun
This patch implements L3 CDP get value callback function. With this patch, 'psr-cat-show' can work for L3 CDP. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c | 19 +++ 1 file changed, 19 insertions(+) diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c index 99add7a..d0392ca 100

[Xen-devel] [PATCH v4 21/24] tools: L2 CAT: support get HW info for L2 CAT.

2016-12-14 Thread Yi Sun
This patch implements xl/xc changes to support get HW info for L2 CAT. 'xl psr-hwinfo' is updated to show both L3 CAT and L2 CAT info. Example(on machine which only supports L2 CAT): Cache Monitoring Technology (CMT): Enabled : 0 Cache Allocation Technology (CAT): L3 libxl: error: libxl_p

[Xen-devel] [PATCH v4 16/24] x86: refactor psr: implement set value callback functions for CDP.

2016-12-14 Thread Yi Sun
This patch implements L3 CDP set value related callback functions. With this patch, 'psr-cat-cbm-set' command can work for L3 CDP. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c | 138 + 1 file changed, 138 insertions(+) diff --git a/xen/arch/x

[Xen-devel] [PATCH v4 19/24] x86: L2 CAT: implement get value flow.

2016-12-14 Thread Yi Sun
This patch implements L2 CAT get value callback function and interface in domctl. Signed-off-by: Yi Sun --- xen/arch/x86/domctl.c | 7 +++ xen/arch/x86/psr.c | 16 xen/include/public/domctl.h | 1 + 3 files changed, 24 insertions(+) diff --git a/xen/arch/x8

[Xen-devel] [PATCH v4 23/24] tools: L2 CAT: support set cbm for L2 CAT.

2016-12-14 Thread Yi Sun
This patch implements the xl/xc changes to support set CBM for L2 CAT. The new level option is introduced to original CAT setting command in order to set CBM for specified level CAT. - 'xl psr-cat-cbm-set' is updated to set cache capacity bitmasks(CBM) for a domain according to input cache level

[Xen-devel] [PATCH v4 24/24] docs: add L2 CAT description in docs.

2016-12-14 Thread Yi Sun
This patch adds L2 CAT description in related documents. Signed-off-by: He Chen Signed-off-by: Yi Sun --- docs/man/xl.pod.1.in | 25 ++--- docs/misc/xl-psr.markdown | 10 -- 2 files changed, 30 insertions(+), 5 deletions(-) diff --git a/docs/man/xl.pod.1.in b/d

[Xen-devel] [PATCH] x86: Use ACPI reboot method for Dell OptiPlex 9020

2016-12-14 Thread Ross Lagerwall
When EFI booting the Dell OptiPlex 9020, it sometimes GP faults in the EFI runtime instead of rebooting. Quirk this hardware to use the ACPI reboot method instead. dmidecode info: BIOS Information Vendor: Dell Inc. Version: A15 Release Date: 11/08/2015 System Information Manufactu

Re: [Xen-devel] Future x86 emulator direction

2016-12-14 Thread Jan Beulich
>>> On 14.12.16 at 11:43, wrote: > The movlpd's should be easy to implement. They aren't meaningfully > different from their integer counterparts in terms of needs for the > emulator. Well, the thing here is the increasing complexity of determining the right size to do the actual memory access w

Re: [Xen-devel] [PATCH] x86/emul: Further simplify DstBitBase handling

2016-12-14 Thread Jan Beulich
>>> On 14.12.16 at 12:04, wrote: > The masking of src.val is common to both paths. Move it later and simplify > the entry condition for adjusting the memory operand. > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich ___ Xen-devel mailing l

[Xen-devel] [PATCH] x86/emul: Simplfy L{ES,DS,SS,FS,GS} handling

2016-12-14 Thread Andrew Cooper
%ss, %fs and %gs can be calculated by directly masking the opcode. %es and %ds cant, but the calculation isn't hard. Use seg rather than dst.val for storing the calculated segment, which is appropriately typed. The mode_64() check can be repositioned and simplified to drop the ext check. Replac

[Xen-devel] [RFC PATCH] vvmx: replace vmreturn() by vmsucceed() and vmfail*()

2016-12-14 Thread Haozhong Zhang
Replace vmreturn() by vmsucceed(), vmfail(), vmfail_valid() and vmfail_invalid(), which are consistent to the pseudo code on Intel SDM, and allow to return VM instruction error numbers to L1 hypervisor. Signed-off-by: Haozhong Zhang --- * This patch is based on my patchset "[PATCH v2 0/4] vvmx: f

[Xen-devel] [PATCH] x86/traps: Correct overly-general assertion introduced in c/s d5c251c

2016-12-14 Thread Andrew Cooper
The assertion about guest paging mode must only apply to guest pagefaults. This ASSERT() accidentally also trips if Xen takes a pagefault when in HVM context, such as a copy_to_user() failure in the shadow pagetable code. Signed-off-by: Andrew Cooper --- CC: Jan Beulich --- xen/arch/x86/traps.

[Xen-devel] [PATCH] libxl: init_acpi_config should return rc in exit path

2016-12-14 Thread Wei Liu
... otherwise it returns 0 even if the function fails. Signed-off-by: Wei Liu --- Cc: Ian Jackson This should be backported to 4.8. --- tools/libxl/libxl_x86_acpi.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/libxl/libxl_x86_acpi.c b/tools/libxl/libxl_x86_acpi.c i

Re: [Xen-devel] [PATCH] libxl: init_acpi_config should return rc in exit path

2016-12-14 Thread Andrew Cooper
On 14/12/16 11:44, Wei Liu wrote: > ... otherwise it returns 0 even if the function fails. Coverity-ID: 1397121 > Signed-off-by: Wei Liu Reviewed-by: Andrew Cooper > --- > Cc: Ian Jackson > > This should be backported to 4.8. > --- > tools/libxl/libxl_x86_acpi.c | 2 +- > 1 file changed, 1

Re: [Xen-devel] [RFC PATCH] vvmx: replace vmreturn() by vmsucceed() and vmfail*()

2016-12-14 Thread Andrew Cooper
On 14/12/16 11:29, Haozhong Zhang wrote: > Replace vmreturn() by vmsucceed(), vmfail(), vmfail_valid() and > vmfail_invalid(), which are consistent to the pseudo code on Intel > SDM, and allow to return VM instruction error numbers to L1 > hypervisor. > > Signed-off-by: Haozhong Zhang > --- > * Th

Re: [Xen-devel] [PATCH] x86: Use ACPI reboot method for Dell OptiPlex 9020

2016-12-14 Thread Andrew Cooper
On 14/12/16 11:12, Ross Lagerwall wrote: > When EFI booting the Dell OptiPlex 9020, it sometimes GP faults in the > EFI runtime instead of rebooting. Quirk this hardware to use the ACPI > reboot method instead. > > dmidecode info: > > BIOS Information > Vendor: Dell Inc. > Version: A15 >

Re: [Xen-devel] Future x86 emulator direction

2016-12-14 Thread Andrew Cooper
On 14/12/16 11:13, Jan Beulich wrote: On 14.12.16 at 11:43, wrote: >> The movlpd's should be easy to implement. They aren't meaningfully >> different from their integer counterparts in terms of needs for the >> emulator. > Well, the thing here is the increasing complexity of determining > th

Re: [Xen-devel] [PATCH v2 4/4] nestedhvm: replace VMCX_EADDR by INVALID_PADDR

2016-12-14 Thread Tian, Kevin
> From: Zhang, Haozhong > Sent: Wednesday, December 14, 2016 6:12 PM > > ... because INVALID_PADDR is a more general one. > > Suggested-by: Jan Beulich > Signed-off-by: Haozhong Zhang Reviewed-by: Kevin Tian ___ Xen-devel mailing list Xen-devel@lis

Re: [Xen-devel] [PATCH v2 1/2] arm/mem_access: adjust check_and_get_page to not rely on current

2016-12-14 Thread Julien Grall
Hi Andrew, On 13/12/16 19:39, Andrew Cooper wrote: On 13/12/16 18:41, Julien Grall wrote: On 13/12/16 18:28, Andrew Cooper wrote: On 12/12/16 23:47, Tamas K Lengyel wrote: Newer versions of VT-x/SVM may provide additional information on a vmexit, which include a guest physical address relevant

[Xen-devel] [xen-unstable-smoke test] 103325: regressions - FAIL

2016-12-14 Thread osstest service owner
flight 103325 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/103325/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-libvirt 5 libvirt-buildfail REGR. vs. 103284 Tests which

Re: [Xen-devel] [PATCH] libxl: init_acpi_config should return rc in exit path

2016-12-14 Thread Wei Liu
On Wed, Dec 14, 2016 at 11:49:34AM +, Andrew Cooper wrote: > On 14/12/16 11:44, Wei Liu wrote: > > ... otherwise it returns 0 even if the function fails. > > Coverity-ID: 1397121 > Does it work this way? Coverity does lead to the discovery of this bug, but this CID doesn't reveal the bug dir

Re: [Xen-devel] [PATCH] x86emul: support {RD,WR}{F,G}SBASE

2016-12-14 Thread Andrew Cooper
On 14/12/16 09:37, Jan Beulich wrote: > Signed-off-by: Jan Beulich > > --- a/xen/arch/x86/x86_emulate/x86_emulate.c > +++ b/xen/arch/x86/x86_emulate/x86_emulate.c > @@ -432,6 +432,7 @@ typedef union { > #define CR4_OSFXSR (1<<9) > #define CR4_OSXMMEXCPT (1<<10) > #define CR4_UMIP (1<<

Re: [Xen-devel] [PATCH] x86/traps: Correct overly-general assertion introduced in c/s d5c251c

2016-12-14 Thread Jan Beulich
>>> On 14.12.16 at 12:35, wrote: > The assertion about guest paging mode must only apply to guest pagefaults. > > This ASSERT() accidentally also trips if Xen takes a pagefault when in HVM > context, such as a copy_to_user() failure in the shadow pagetable code. > > Signed-off-by: Andrew Cooper

Re: [Xen-devel] [PATCH] x86: Use ACPI reboot method for Dell OptiPlex 9020

2016-12-14 Thread Jan Beulich
>>> On 14.12.16 at 12:12, wrote: > When EFI booting the Dell OptiPlex 9020, it sometimes GP faults in the > EFI runtime instead of rebooting. Has it been understood what the #GP is due to? I.e. is it namely not because of a mis-aligned SSE instruction memory reference? Jan

[Xen-devel] [PATCH][XTF] don't require x32 support in binutils

2016-12-14 Thread Jan Beulich
Older binutils don't have this at all, and newer may not have it configured in. Signed-off-by: Jan Beulich --- a/build/gen.mk +++ b/build/gen.mk @@ -40,6 +40,8 @@ install: install-each-env info.json @$(INSTALL_DIR) $(DESTDIR)$(xtftestdir)/$(NAME) $(INSTALL_DATA) info.json $(DESTD

Re: [Xen-devel] [PATCH][XTF] don't require x32 support in binutils

2016-12-14 Thread Andrew Cooper
On 14/12/16 13:07, Jan Beulich wrote: > Older binutils don't have this at all, and newer may not have it > configured in. > > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper , although > > --- a/build/gen.mk > +++ b/build/gen.mk > @@ -40,6 +40,8 @@ install: install-each-env info.json >

Re: [Xen-devel] [PATCH] x86: Use ACPI reboot method for Dell OptiPlex 9020

2016-12-14 Thread Andrew Cooper
On 14/12/16 12:58, Jan Beulich wrote: On 14.12.16 at 12:12, wrote: >> When EFI booting the Dell OptiPlex 9020, it sometimes GP faults in the >> EFI runtime instead of rebooting. > Has it been understood what the #GP is due to? I.e. is it namely > not because of a mis-aligned SSE instruction m

Re: [Xen-devel] [PATCH][XTF] don't require x32 support in binutils

2016-12-14 Thread Andrew Cooper
On 14/12/16 13:10, Andrew Cooper wrote: > On 14/12/16 13:07, Jan Beulich wrote: >> Older binutils don't have this at all, and newer may not have it >> configured in. >> >> Signed-off-by: Jan Beulich > > Reviewed-by: Andrew Cooper , although > >> --- a/build/gen.mk >> +++ b/build/gen.mk >> @@ -40,6

Re: [Xen-devel] [PATCH] x86emul: support {RD,WR}{F,G}SBASE

2016-12-14 Thread Jan Beulich
>>> On 14.12.16 at 13:36, wrote: > On 14/12/16 09:37, Jan Beulich wrote: >> @@ -5205,6 +5206,44 @@ x86_emulate( >> } >> break; >> >> +case X86EMUL_OPC_F3(0x0f, 0xae): /* Grp15 */ >> +{ >> +unsigned long cr4; >> + >> +fail_if(modrm_mod != 3); > > This sh

Re: [Xen-devel] [MULTIBOOT2 DOC PATCH v3 00/13] multiboot2: Update documentation

2016-12-14 Thread Daniel Kiper
On Fri, Dec 09, 2016 at 01:57:13PM +0100, Daniel Kiper wrote: > On Tue, Dec 06, 2016 at 11:52:48PM +0100, Daniel Kiper wrote: > > Hi, > > > > This updated patch series adds description of the Multiboot2 protocol new > > features and fixes some issues found here and there. > > > > It applies to mult

Re: [Xen-devel] [PATCH] x86emul: support {RD,WR}{F,G}SBASE

2016-12-14 Thread Andrew Cooper
On 14/12/16 13:18, Jan Beulich wrote: On 14.12.16 at 13:36, wrote: >> On 14/12/16 09:37, Jan Beulich wrote: >>> @@ -5205,6 +5206,44 @@ x86_emulate( >>> } >>> break; >>> >>> +case X86EMUL_OPC_F3(0x0f, 0xae): /* Grp15 */ >>> +{ >>> +unsigned long cr4; >>> + >

Re: [Xen-devel] [PATCH] x86: Use ACPI reboot method for Dell OptiPlex 9020

2016-12-14 Thread Andrew Cooper
On 14/12/16 13:21, Jan Beulich wrote: On 14.12.16 at 14:15, wrote: >> On 14/12/16 12:58, Jan Beulich wrote: >> On 14.12.16 at 12:12, wrote: When EFI booting the Dell OptiPlex 9020, it sometimes GP faults in the EFI runtime instead of rebooting. >>> Has it been understood what t

Re: [Xen-devel] megaraid_sas regression in linux-3.18 [and 1 more messages]

2016-12-14 Thread Ian Jackson
alexander.le...@verizon.com writes ("RE: megaraid_sas regression in linux-3.18 [and 1 more messages]"): > Added 5e5ec1759dd6 to the 3.18 queue, thanks! How often does this queue get flushed ? Thanks, Ian. ___ Xen-devel mailing list Xen-devel@lists.xen

[Xen-devel] Regression due to "mm/swap.c: flush lru pvecs on compound page arrival"

2016-12-14 Thread Ian Jackson
osstest service owner writes ("[linux-3.18 bisection] complete test-amd64-amd64-xl-qemut-win7-amd64"): > *** Found and reproduced problem changeset *** > > Bug is in tree: linux > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git > Bug introduced: a2d8c514753276394d6841

Re: [Xen-devel] [PATCH] x86/emul: Simplfy L{ES, DS, SS, FS, GS} handling

2016-12-14 Thread Jan Beulich
>>> On 14.12.16 at 12:20, wrote: > --- a/xen/arch/x86/x86_emulate/x86_emulate.c > +++ b/xen/arch/x86/x86_emulate/x86_emulate.c > @@ -2765,6 +2765,7 @@ x86_emulate( > if ( mode_64bit() && (op_bytes == 4) ) > op_bytes = 8; > seg = (b >> 3) & 7; > +ASSERT(is_x86

Re: [Xen-devel] [PATCH] x86emul: support {RD,WR}{F,G}SBASE

2016-12-14 Thread Jan Beulich
>>> On 14.12.16 at 14:28, wrote: > On 14/12/16 13:18, Jan Beulich wrote: > On 14.12.16 at 13:36, wrote: >>> On 14/12/16 09:37, Jan Beulich wrote: @@ -5205,6 +5206,44 @@ x86_emulate( } break; +case X86EMUL_OPC_F3(0x0f, 0xae): /* Grp15 */ +

Re: [Xen-devel] Regression due to "mm/swap.c: flush lru pvecs on compound page arrival"

2016-12-14 Thread Michal Hocko
On Wed 14-12-16 13:29:56, Ian Jackson wrote: > osstest service owner writes ("[linux-3.18 bisection] complete > test-amd64-amd64-xl-qemut-win7-amd64"): > > *** Found and reproduced problem changeset *** > > > > Bug is in tree: linux > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/lin

Re: [Xen-devel] Xen: ARM: Support for mapping OperationRegion in ACPI ASL

2016-12-14 Thread Konrad Rzeszutek Wilk
On Tue, Dec 13, 2016 at 07:14:27PM -0600, Jiandi An wrote: > Hi Guys, > > Xen currently does not handle mapping of MMIO regions specified under > OperationRegion in ACPI ASL. OperationRegion is well defined in ACPI > specification. I'm seeking for architectural direction on adding support for

Re: [Xen-devel] Xen 4.9 Development Update

2016-12-14 Thread Artem Mygaiev
Hi Stefano On 09.12.16 21:01, Stefano Stabellini wrote: > On Fri, 9 Dec 2016, Oleksandr Andrushchenko wrote: >> On 12/09/2016 03:57 PM, Pasi Kärkkäinen wrote: >>> On Fri, Dec 09, 2016 at 02:57:04PM +0200, Oleksandr Andrushchenko wrote: >> Should we have a section on new PV drivers? If so, I s

Re: [Xen-devel] [PATCH] x86emul: support {RD,WR}{F,G}SBASE

2016-12-14 Thread Andrew Cooper
On 14/12/16 13:39, Jan Beulich wrote: On 14.12.16 at 14:28, wrote: >> On 14/12/16 13:18, Jan Beulich wrote: >> On 14.12.16 at 13:36, wrote: On 14/12/16 09:37, Jan Beulich wrote: > @@ -5205,6 +5206,44 @@ x86_emulate( > } > break; > > +case

Re: [Xen-devel] [PATCH] x86/emul: Simplfy L{ES, DS, SS, FS, GS} handling

2016-12-14 Thread Andrew Cooper
On 14/12/16 13:34, Jan Beulich wrote: On 14.12.16 at 12:20, wrote: >> --- a/xen/arch/x86/x86_emulate/x86_emulate.c >> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c >> @@ -2765,6 +2765,7 @@ x86_emulate( >> if ( mode_64bit() && (op_bytes == 4) ) >> op_bytes = 8; >>

Re: [Xen-devel] [RFC PATCH] vvmx: replace vmreturn() by vmsucceed() and vmfail*()

2016-12-14 Thread Haozhong Zhang
On 12/14/16 11:55 +, Andrew Cooper wrote: On 14/12/16 11:29, Haozhong Zhang wrote: Replace vmreturn() by vmsucceed(), vmfail(), vmfail_valid() and vmfail_invalid(), which are consistent to the pseudo code on Intel SDM, and allow to return VM instruction error numbers to L1 hypervisor. Signe

Re: [Xen-devel] [PATCH] x86/traps: Correct overly-general assertion introduced in c/s d5c251c

2016-12-14 Thread Andrew Cooper
On 14/12/16 12:52, Jan Beulich wrote: On 14.12.16 at 12:35, wrote: >> The assertion about guest paging mode must only apply to guest pagefaults. >> >> This ASSERT() accidentally also trips if Xen takes a pagefault when in HVM >> context, such as a copy_to_user() failure in the shadow pagetabl

Re: [Xen-devel] [HACKERS] [OSSTEST PATCH 0/1] PostgreSQL db: Retry on constraint violation [and 2 more messages]

2016-12-14 Thread Alvaro Herrera
Robert Haas wrote: > I have not read any database literature on the interaction of > serializability with subtransactions. This seems very thorny. > Suppose T1 reads A and B and updates A -> A' while concurrently T2 > reads A and B and updates B -> B'. This is obviously not > serializable; if ei

[Xen-devel] [PATCH v2] x86/traps: Correct overly-general assertion introduced in c/s d5c251c

2016-12-14 Thread Andrew Cooper
The assertion about guest paging mode must only apply to guest pagefaults, as should the later call to paging_fault(). This ASSERT() accidentally also trips if Xen takes a pagefault when in HVM context, such as a copy_to_user() failure in the shadow pagetable code. Merge the ASSERT() into the lat

  1   2   >