Re: [Xen-devel] [PATCH v3 2/2] xen/kbdif: add multi-touch support

2017-02-20 Thread Oleksandr Andrushchenko
ping On 02/08/2017 04:42 PM, Konrad Rzeszutek Wilk wrote: On Wed, Feb 08, 2017 at 09:38:18AM +0200, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko Multi-touch fields re-use the page that is used by the other features which means that you can interleave multi-touch, motion, and k

Re: [Xen-devel] Unshared IOMMU issues

2017-02-20 Thread Julien Grall
Hello Oleksandr, On 02/17/2017 08:20 PM, Oleksandr Tyshchenko wrote: Hi, all. So, as I understand we have two possible solutions for the IOMMU page table to be populated: 1. When the first device is being assigned. Retrieve all mappings from stage-2 table. 2. When the domain is being created.

[Xen-devel] [linux-linus test] 105918: regressions - trouble: blocked/broken/fail/pass

2017-02-20 Thread osstest service owner
flight 105918 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/105918/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 3 host-install(3) broken REGR. vs. 59254 test-amd64-amd64-xl

Re: [Xen-devel] [PATCH 3/8] xen/arm: acpi: Don't fallback on DT when user request ACPI

2017-02-20 Thread Julien Grall
Hi Stefano, On 02/16/2017 01:41 AM, Stefano Stabellini wrote: On Fri, 3 Feb 2017, Julien Grall wrote: On ARM, when the user put 'acpi=force' Xen will use ACPI over DT. Currently, if Xen fails to initialize ACPI it will fallback on DT. This behavior makes difficult for a user to notice Xen didn

Re: [Xen-devel] [PATCH 04/19] xen/mce: remove unused x86_mcinfo_add()

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 02:52, wrote: > On 02/17/17 02:55 -0700, Jan Beulich wrote: >> >>> On 17.02.17 at 07:39, wrote: >> > Signed-off-by: Haozhong Zhang >> >> Not sure here, I can't imagine the function being here without >> reason, even if the plans perhaps never got carried out. Could >> you ple

Re: [Xen-devel] [PATCH 08/19] x86/mce: set mcinfo_comm.type and .size in x86_mcinfo_reserve()

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 03:48, wrote: > On 02/17/17 03:07 -0700, Jan Beulich wrote: >> >>> On 17.02.17 at 07:39, wrote: >> > @@ -804,7 +800,7 @@ static void mcinfo_clear(struct mc_info *mi) >> > x86_mcinfo_nentries(mi) = 0; >> > } >> > >> > -void *x86_mcinfo_reserve(struct mc_info *mi, int siz

Re: [Xen-devel] [PATCH 09/19] x86/vmce: fill MSR_IA32_MCG_STATUS on all vcpus in broadcast case

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 05:36, wrote: > On 02/17/17 03:21 -0700, Jan Beulich wrote: >> >>> On 17.02.17 at 07:39, wrote: >> > +continue; >> > +ret = vcpu_fill_mc_msrs(v, MCG_STATUS_MCIP | MCG_STATUS_RIPV, >> > +0, 0, 0); >> >> What guarantees RIP to

Re: [Xen-devel] [PATCH 04/19] xen/mce: remove unused x86_mcinfo_add()

2017-02-20 Thread Haozhong Zhang
On 02/20/17 02:00 -0700, Jan Beulich wrote: > >>> On 20.02.17 at 02:52, wrote: > > On 02/17/17 02:55 -0700, Jan Beulich wrote: > >> >>> On 17.02.17 at 07:39, wrote: > >> > Signed-off-by: Haozhong Zhang > >> > >> Not sure here, I can't imagine the function being here without > >> reason, even if

Re: [Xen-devel] [PATCH 08/19] x86/mce: set mcinfo_comm.type and .size in x86_mcinfo_reserve()

2017-02-20 Thread Haozhong Zhang
On 02/20/17 02:02 -0700, Jan Beulich wrote: > >>> On 20.02.17 at 03:48, wrote: > > On 02/17/17 03:07 -0700, Jan Beulich wrote: > >> >>> On 17.02.17 at 07:39, wrote: > >> > @@ -804,7 +800,7 @@ static void mcinfo_clear(struct mc_info *mi) > >> > x86_mcinfo_nentries(mi) = 0; > >> > } > >> >

Re: [Xen-devel] [PATCH 09/19] x86/vmce: fill MSR_IA32_MCG_STATUS on all vcpus in broadcast case

2017-02-20 Thread Haozhong Zhang
On 02/20/17 02:04 -0700, Jan Beulich wrote: > >>> On 20.02.17 at 05:36, wrote: > > On 02/17/17 03:21 -0700, Jan Beulich wrote: > >> >>> On 17.02.17 at 07:39, wrote: > >> > +continue; > >> > +ret = vcpu_fill_mc_msrs(v, MCG_STATUS_MCIP | MCG_STATUS_RIPV, > >> > +

[Xen-devel] [distros-debian-sid test] 68583: tolerable trouble: blocked/broken/fail/pass

2017-02-20 Thread Platform Team regression test user
flight 68583 distros-debian-sid real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68583/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-i386-sid-netboot-pvgrub 10 guest-start fail blocked in 68553 test-amd64-amd64-am

Re: [Xen-devel] [dpdk-dev] [PATCH] maintainers: claim responsability for xen

2017-02-20 Thread Jan Blunck
On Fri, Feb 17, 2017 at 5:07 PM, Konrad Rzeszutek Wilk wrote: > On Thu, Feb 16, 2017 at 10:51:44PM +0100, Vincent JARDIN wrote: >> Le 16/02/2017 à 14:36, Konrad Rzeszutek Wilk a écrit : >> > > Is it time now to officially remove Dom0 support? >> > So we do have an prototype implementation of netba

Re: [Xen-devel] [PATCH] ring.h: introduce macros to handle monodirectional rings with multiple req sizes

2017-02-20 Thread Jan Beulich
>>> On 17.02.17 at 23:38, wrote: For all of the comments below, please understand that I'm giving them in the understanding that pre-existing code may be similarly problematic; we shouldn't introduce new issues though. > --- a/xen/include/public/io/ring.h > +++ b/xen/include/public/io/ring.h > @

[Xen-devel] [PATCH v2 3/3] x86/emul: Support CPUID faulting via a speculative MSR read

2017-02-20 Thread Andrew Cooper
This removes the need for every cpuid() emulation hook to individually support CPUID faulting. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Paul Durrant v2: * Substantial rebase * Reimplement speculative reading by squashing the exception rather than trying to prevent it by using

[Xen-devel] [PATCH v2 0/3] x86/emul: MSR emulation improvements

2017-02-20 Thread Andrew Cooper
Split out from a previous general emulation series. Substantially rebased. Andrew Cooper (3): x86/hvm: Don't raise #GP behind the emulators back for MSR accesses x86/emul: Introduce common msr_val for emulation x86/emul: Support CPUID faulting via a speculative MSR read xen/arch/x86/hvm/e

[Xen-devel] [PATCH v2 2/3] x86/emul: Introduce common msr_val for emulation

2017-02-20 Thread Andrew Cooper
Use it consistently in place of local tsc_aux, msr_content and val declarations, and replace opencoded uses of X86EMUL_OKAY. No functional change. Signed-off-by: Andrew Cooper --- CC: Jan Beulich v2: * New --- xen/arch/x86/x86_emulate/x86_emulate.c | 95 ++ 1

[Xen-devel] [PATCH v2 1/3] x86/hvm: Don't raise #GP behind the emulators back for MSR accesses

2017-02-20 Thread Andrew Cooper
The current hvm_msr_{read,write}_intercept() infrastructure calls hvm_inject_hw_exception() directly to latch a fault, and returns X86EMUL_EXCEPTION to its caller. This behaviour is problematic for the hvmemul_{read,write}_msr() paths, as the fault is raised behind the back of the x86 emulator. A

Re: [Xen-devel] [PATCH v2 3/3] x86/emul: Support CPUID faulting via a speculative MSR read

2017-02-20 Thread Paul Durrant
> -Original Message- > From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: 20 February 2017 10:29 > To: Xen-devel > Cc: Andrew Cooper ; Jan Beulich > ; Paul Durrant > Subject: [PATCH v2 3/3] x86/emul: Support CPUID faulting via a speculative > MSR read > > This removes the nee

Re: [Xen-devel] [PATCH v2 1/3] x86/hvm: Don't raise #GP behind the emulators back for MSR accesses

2017-02-20 Thread Paul Durrant
> -Original Message- > From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: 20 February 2017 10:29 > To: Xen-devel > Cc: Andrew Cooper ; Paul Durrant > ; Boris Ostrovsky ; > Suravee Suthikulpanit > Subject: [PATCH v2 1/3] x86/hvm: Don't raise #GP behind the emulators back > for

Re: [Xen-devel] [PATCH] x86/VMX: sanitize VM86 TSS handling

2017-02-20 Thread Tim Deegan
At 04:49 -0700 on 16 Feb (1487220558), Jan Beulich wrote: > >>> On 16.02.17 at 12:14, wrote: > On 15.02.17 at 12:21, wrote: > >> At 01:18 -0700 on 15 Feb (1487121525), Jan Beulich wrote: > >>> >>> On 14.02.17 at 18:33, wrote: > >>> >> TBD: Do we really want to re-init the TSS every time we

[Xen-devel] Removing PVHv1 code (was: Re: [linux-linus bisection] complete) test-amd64-amd64-xl-pvh-intel

2017-02-20 Thread Roger Pau Monne
On Mon, Feb 20, 2017 at 12:20:10AM +, Andrew Cooper wrote: > From > http://logs.test-lab.xenproject.org/osstest/logs/105917/test-amd64-amd64-xl-pvh-intel/serial-fiano0.log > around Feb 19 23:12:06.269706 > > (XEN) [ Xen-4.9-unstable x86_64 debug=y Not tainted ] > (XEN) CPU:2 >

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-20 Thread George Dunlap
On 19/02/17 21:27, Julien Grall wrote: > Hi Dario, > > On 02/18/2017 01:47 AM, Dario Faggioli wrote: >> On Fri, 2017-02-17 at 14:50 -0800, Stefano Stabellini wrote: >>> On Fri, 17 Feb 2017, Julien Grall wrote: Please explain in which context this will be beneficial. My gut feeling is >>>

Re: [Xen-devel] [PATCH v3] x86/shadow: Correct guest behaviour when creating PTEs above maxphysaddr

2017-02-20 Thread Tim Deegan
At 15:45 + on 16 Feb (1487259954), Andrew Cooper wrote: > XSA-173 (c/s 8b1764833) introduces gfn_bits, and an upper limit which might be > lower than the real maxphysaddr, to avoid overflowing the superpage shadow > backpointer. > > However, plenty of hardware has a physical address width less

Re: [Xen-devel] [PATCH] x86/mm: Swap mfn_valid() to use mfn_t

2017-02-20 Thread Tim Deegan
At 20:07 + on 16 Feb (1487275634), Andrew Cooper wrote: > Replace one opencoded mfn_eq() and some coding style issues on altered lines. > Swap __mfn_valid() to being bool, although it can't be updated to take mfn_t > because of include dependencies. > > No functional change. > > Signed-off-by

Re: [Xen-devel] [PATCH v2 2/3] x86/emul: Introduce common msr_val for emulation

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 11:28, wrote: > Use it consistently in place of local tsc_aux, msr_content and val > declarations, and replace opencoded uses of X86EMUL_OKAY. > > No functional change. > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich One thing less on my to-be-done-eventually lis

Re: [Xen-devel] [PATCH v2 3/3] x86/emul: Support CPUID faulting via a speculative MSR read

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 11:28, wrote: > --- a/xen/arch/x86/x86_emulate/x86_emulate.c > +++ b/xen/arch/x86/x86_emulate/x86_emulate.c > @@ -5424,10 +5424,25 @@ x86_emulate( > break; > > case X86EMUL_OPC(0x0f, 0xa2): /* cpuid */ > +msr_val = 0; > fail_if(ops->cpuid == NULL

[Xen-devel] [PATCH 02/10] x86/gen-cpuid: Clarify the intended meaning of AVX wrt feature dependencies

2017-02-20 Thread Andrew Cooper
Signed-off-by: Andrew Cooper --- CC: Jan Beulich --- xen/tools/gen-cpuid.py | 10 +++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/xen/tools/gen-cpuid.py b/xen/tools/gen-cpuid.py index 5cab6db..6531ca8 100755 --- a/xen/tools/gen-cpuid.py +++ b/xen/tools/gen-cpuid.py @@ -2

[Xen-devel] [PATCH 09/10] x86/cpuid: Drop legacy CPUID infrastructure

2017-02-20 Thread Andrew Cooper
Now that all leaves have been altered to use the guest_cpuid() path, remove all the remaining legacy infrastructure. Signed-off-by: Andrew Cooper --- CC: Jan Beulich --- xen/arch/x86/cpuid.c| 76 - xen/arch/x86/domctl.c | 45 +---

[Xen-devel] [PATCH 04/10] x86/cpuid: Handle leaf 0x4 in guest_cpuid()

2017-02-20 Thread Andrew Cooper
Leaf 0x4 is reserved by AMD. For Intel, it is a multi-invocation leaf with ecx enumerating different cache details. Add a new union for it in struct cpuid_policy, collect it from hardware in calculate_raw_policy(), audit it in recalculate_cpuid_policy() and update guest_cpuid() and update_domain_

[Xen-devel] [PATCH 06/10] x86/cpuid: Handle leaf 0x6 in guest_cpuid()

2017-02-20 Thread Andrew Cooper
The thermal/performance leaf was previously hidden from HVM guests, but fully visible to PV guests. Most of the leaf refers to MSR availability, and there is nothing an unprivileged PV guest can do with the information, so hide the leaf entirely. The PV MSR handling logic as minimal support for s

[Xen-devel] [PATCH 03/10] x86/cpuid: Handle leaf 0x1 in guest_cpuid()

2017-02-20 Thread Andrew Cooper
The features words, ecx and edx, are already audited as part of the featureset logic. The existing leaf 0x8001 dynamic logic has its SYSCALL adjustment split out, as the rest of the adjustments are common with leaf 0x1. The existing leaf 0x1 feature adjustments from {pv,hvm}_cpuid() are moved

[Xen-devel] [PATCH 01/10] x86/cpuid: Disallow policy updates once the domain is running

2017-02-20 Thread Andrew Cooper
On real hardware, the bulk of CPUID data is system-specific and constant. Hold the toolstack to the same behaviour when constructing domains. Values which are expected to change dynamically (e.g. OSXSAVE) are unaffected and continue to function as before. Signed-off-by: Andrew Cooper --- CC: Jan

[Xen-devel] [PATCH 05/10] x86/cpuid: Handle leaf 0x5 in guest_cpuid()

2017-02-20 Thread Andrew Cooper
The MONITOR flag isn't exposed to guests. The existing toolstack logic, and pv_cpuid() in the hypervisor, zero the MONITOR leaf for queries. However, the MONITOR leaf is still visible in the hardware domains native CPUID view, and Linux depends on this to set up C-state information. Leak the hos

[Xen-devel] [PATCH 07/10] x86/cpuid: Handle leaf 0xa in guest_cpuid()

2017-02-20 Thread Andrew Cooper
Leaf 0xa is reserved by AMD, and only exposed to Intel guests when vPMU is enabled. Leave the logic as-was, ready to be cleaned up when further toolstack infrastructure is in place. Signed-off-by: Andrew Cooper --- CC: Jan Beulich --- xen/arch/x86/cpuid.c | 43 -

Re: [Xen-devel] [PATCH v2] x86/VMX: sanitize VM86 TSS handling

2017-02-20 Thread Tim Deegan
At 05:03 -0700 on 17 Feb (1487307837), Jan Beulich wrote: > The present way of setting this up is flawed: Leaving the I/O bitmap > pointer at zero means that the interrupt redirection bitmap lives > outside (ahead of) the allocated space of the TSS. Similarly setting a > TSS limit of 255 when only

[Xen-devel] [PATCH 08/10] x86/cpuid: Handle leaf 0xb in guest_cpuid()

2017-02-20 Thread Andrew Cooper
Leaf 0xb is reserved by AMD, and uniformly hidden from guests by the toolstack logic and hypervisor PV logic. The previous dynamic logic filled in the x2APIC ID for all HVM guests. This is modified to respect the entire leaf being reserved by AMD, but is altered to include PV Intel guests, so the

[Xen-devel] [PATCH 00/10] x86/cpuid: Remove the legacy infrastructure

2017-02-20 Thread Andrew Cooper
This is the final piece of work to move the remaining legacy CPUID logic onto the new guest_cpuid() path, allowing the legacy logic to be dropped entirely. It is available in git form from http://xenbits.xen.org/gitweb/?p=people/andrewcoop/xen.git;a=shortlog;h=refs/heads/xen-cpuid-v4 Andrew Co

Re: [Xen-devel] [PATCH] x86/paging: Package up the log dirty function pointers

2017-02-20 Thread Tim Deegan
At 17:13 + on 16 Feb (1487265184), Andrew Cooper wrote: > They depend soley on paging mode, so don't need to be repeated per domain, and > can live in .rodata. While making this change, drop the redundant log_dirty > from the function pointer names. > > Signed-off-by: Andrew Cooper Acked-by

Re: [Xen-devel] Xen on ARM IRQ latency and scheduler overhead

2017-02-20 Thread George Dunlap
On 18/02/17 00:41, Stefano Stabellini wrote: > On Fri, 17 Feb 2017, Dario Faggioli wrote: >> On Thu, 2017-02-09 at 16:54 -0800, Stefano Stabellini wrote: >>> These are the results, in nanosec: >>> >>> AVG MIN MAX WARM MAX >>> >>> NODEBUG no WFI 18901

Re: [Xen-devel] [PATCH v2 3/3] x86/emul: Support CPUID faulting via a speculative MSR read

2017-02-20 Thread Andrew Cooper
On 20/02/17 10:59, Jan Beulich wrote: On 20.02.17 at 11:28, wrote: >> --- a/xen/arch/x86/x86_emulate/x86_emulate.c >> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c >> @@ -5424,10 +5424,25 @@ x86_emulate( >> break; >> >> case X86EMUL_OPC(0x0f, 0xa2): /* cpuid */ >> +msr_

Re: [Xen-devel] [PATCH v2 3/3] x86/emul: Support CPUID faulting via a speculative MSR read

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 12:04, wrote: > On 20/02/17 10:59, Jan Beulich wrote: > On 20.02.17 at 11:28, wrote: >>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c >>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c >>> @@ -5424,10 +5424,25 @@ x86_emulate( >>> break; >>> >>> case X86EMUL_OP

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-20 Thread Dario Faggioli
On Sun, 2017-02-19 at 21:27 +, Julien Grall wrote: > Hi Dario, > Hi, > On 02/18/2017 01:47 AM, Dario Faggioli wrote: > >  - vcpu A yields, and there are no runnable but not running vcpus > >    around. In this case, A gets to run again. Full stop. > > Which turn to be the busy looping I was

Re: [Xen-devel] [PATCH 1/4] x86/vmx: Don't leak host syscall MSR state into HVM guests

2017-02-20 Thread Andrew Cooper
On 14/02/17 10:13, Jan Beulich wrote: On 14.02.17 at 09:40, wrote: >>> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew >>> Cooper >>> Sent: Tuesday, February 14, 2017 4:19 PM >>> >>> On 14/02/2017 08:04, Tian, Kevin wrote: > From: Andrew Cooper [mailto:am...@herm

[Xen-devel] [PATCH 10/10] x86/cpuid: Always enable faulting for the control domain

2017-02-20 Thread Andrew Cooper
The domain builder in libxc no longer depends on leaked CPUID information to properly construct HVM domains. Remove the control domain exclusion. On capable hardware, this prevents all unintended leakage of hardware CPUID values into the control domain, and brings the hypervisor leaves into view.

Re: [Xen-devel] [PATCH v2] x86/VMX: sanitize VM86 TSS handling

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 12:01, wrote: > At 05:03 -0700 on 17 Feb (1487307837), Jan Beulich wrote: >> The present way of setting this up is flawed: Leaving the I/O bitmap >> pointer at zero means that the interrupt redirection bitmap lives >> outside (ahead of) the allocated space of the TSS. Similarly

Re: [Xen-devel] [PATCH v2] x86/VMX: sanitize VM86 TSS handling

2017-02-20 Thread Tim Deegan
At 04:17 -0700 on 20 Feb (1487564245), Jan Beulich wrote: > >>> On 20.02.17 at 12:01, wrote: > > At 05:03 -0700 on 17 Feb (1487307837), Jan Beulich wrote: > >> The present way of setting this up is flawed: Leaving the I/O bitmap > >> pointer at zero means that the interrupt redirection bitmap live

Re: [Xen-devel] [PATCH] x86/apicv: enhance posted-interrupt processing

2017-02-20 Thread Xuquan (Quan Xu)
On February 18, 2017 12:33 AM, Jan Beulich wrote: On 17.02.17 at 09:49, wrote: >> On Fri, Feb 17, 2017 at 09:37:45AM +, Xuquan (Quan Xu) wrote: >>>From a589074281cc22a30ed75a5bccba60e83d2312a6 Mon Sep 17 >00:00:00 2001 >>>From: Quan Xu >>>Date: Sat, 18 Feb 2017 09:27:37 +0800 >>>Subject:

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-20 Thread Dario Faggioli
On Sun, 2017-02-19 at 21:34 +, Julien Grall wrote: > Hi Stefano, > > I have CCed another ARM person who has more knowledge than me on  > scheduling/power. > Ah, when I saw this, I thought you were Cc-ing my friend Juri, which also works there, and is doing that stuff. :-) > > In both cases th

Re: [Xen-devel] [RFC PATCH v1 01/21] ARM: NUMA: Add existing ARM numa code under CONFIG_NUMA

2017-02-20 Thread Julien Grall
Hello Vijay, On 09/02/17 15:56, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Right not CONFIG_NUMA is not enabled for ARM and s/not/now/ existing code in asm-arm/numa.h is for !COFIG_NUMA. s/COFIG_NUMA/CONFIG_NUMA/ Hence put this code under #ifndef CONFIG_NUMA. This help to make

Re: [Xen-devel] Xen on ARM IRQ latency and scheduler overhead

2017-02-20 Thread Dario Faggioli
On Mon, 2017-02-20 at 11:04 +, George Dunlap wrote: > On 18/02/17 00:41, Stefano Stabellini wrote: > > > > On Fri, 17 Feb 2017, Dario Faggioli wrote: > > > cyclictest 1us cyclictest 1ms cyclictest > > > 100ms > > > (cycles) Credit1 Credit2 Credit1 Cred > > >

Re: [Xen-devel] [RFC PATCH v1 02/21] x86: NUMA: Refactor NUMA code

2017-02-20 Thread Julien Grall
Hi, On 09/02/17 16:11, Jan Beulich wrote: On 09.02.17 at 16:56, wrote: From: Vijaya Kumar K Move common generic NUMA code to xen/common/numa.c from xen/arch/x86/numa.c. Also move generic code in header file xen/include/asm-x86/numa.h to xen/include/xen/numa.h This common code can be re-used

[Xen-devel] [xen-unstable test] 105919: tolerable FAIL

2017-02-20 Thread osstest service owner
flight 105919 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/105919/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-pair 21 guest-migrate/src_host/dst_host fail in 105900 pass in 105919 test-armhf-armhf-xl-cred

Re: [Xen-devel] [PATCH 1/3] fuzz/x86emul: avoid race in link farm rune

2017-02-20 Thread Wei Liu
On Fri, Feb 17, 2017 at 04:44:45AM -0700, Jan Beulich wrote: > >>> On 17.02.17 at 12:36, wrote: > > On Fri, Feb 17, 2017 at 03:33:26AM -0700, Jan Beulich wrote: > >> >>> On 17.02.17 at 11:12, wrote: > >> > On Thu, Feb 16, 2017 at 07:10:41PM +, Andrew Cooper wrote: > >> >> On 16/02/17 18:56, W

Re: [Xen-devel] [xen-unstable test] 104131: regressions - FAIL

2017-02-20 Thread Xuquan (Quan Xu)
On February 13, 2017 4:21 PM, Tian, Kevin wrote: >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: Wednesday, February 08, 2017 4:52 PM >> >> >>> On 08.02.17 at 09:27, wrote: >> > Assumed vCPU is in guest_mode.. >> > When apicv is enabled, hypervisor calls vmx_deliver_posted_intr(), >> > th

[Xen-devel] [PATCH v3 1/2] fuzz/x86emul: avoid race in link farm rune

2017-02-20 Thread Wei Liu
Several `ln -sf` can race with each other and cause error like: 14:43:56 00:07:06 O: ln: cannot remove 'asm': No such file or directory Provide dedicated targets for soft-linking directories. Reported-by: Andrew Cooper Signed-off-by: Wei Liu --- v3: use pattern matching rule --- tools/fuzz/x8

[Xen-devel] [PATCH v3 2/2] x86emul/test: avoid race in link farm rune

2017-02-20 Thread Wei Liu
Several `ln -sf` can race with each other. Provide dedicated targets for soft-linking directories. Signed-off-by: Wei Liu --- tools/tests/x86_emulator/Makefile | 12 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/tools/tests/x86_emulator/Makefile b/tools/tests/x86_e

[Xen-devel] [PATCH v3 0/2] Fuzz/x86emul and x86emul/test fixes

2017-02-20 Thread Wei Liu
Wei Liu (2): fuzz/x86emul: avoid race in link farm rune x86emul/test: avoid race in link farm rune tools/fuzz/x86_instruction_emulator/Makefile | 12 tools/tests/x86_emulator/Makefile| 12 2 files changed, 16 insertions(+), 8 deletions(-) -- 2.11.0 __

Re: [Xen-devel] [PATCH] libxc: don't pass uninitialized data to do_dm_op()

2017-02-20 Thread Wei Liu
On Thu, Feb 16, 2017 at 08:44:08AM -0700, Jan Beulich wrote: > do_dm_op() expects (void *, size_t) pairs, but with nr being uint32_t > the type of the expression of xc_hvm_track_dirty_vram()'s last argument > to the function is only a 32 bits one. Neither C nor the ABI require > the compiler to pro

Re: [Xen-devel] [PATCH 11/19] tools/xen-mceinj: fix the type of cpu number

2017-02-20 Thread Wei Liu
On Fri, Feb 17, 2017 at 03:08:55AM -0700, Jan Beulich wrote: > >>> On 17.02.17 at 07:39, wrote: > > Use uint32_t rather than int to align to the type of > > xen_mc_physcpuinfo.ncpus. > > I'm not sure about policies in the tool stack, but in the hypervisor I > would request to use unsigned int ins

Re: [Xen-devel] [PATCH 17/19] x86/vmce, tools/libxl: expose LMCE capability in guest MSR_IA32_MCG_CAP

2017-02-20 Thread Wei Liu
On Fri, Feb 17, 2017 at 02:39:34PM +0800, Haozhong Zhang wrote: > If LMCE is supported by host and "lmce = 1" is present in xl config, the > LMCE capability will be exposed in guest MSR_IA32_MCG_CAP. By default, > LMCE is not exposed to guest so as to keep the backwards migration > compatibility. >

Re: [Xen-devel] [RFC PATCH v1 02/21] x86: NUMA: Refactor NUMA code

2017-02-20 Thread Julien Grall
Hello Vijay, On 09/02/17 15:56, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Move common generic NUMA code to xen/common/numa.c from xen/arch/x86/numa.c. Also move generic code in header file xen/include/asm-x86/numa.h to xen/include/xen/numa.h This common code can be re-used later for

Re: [Xen-devel] [PATCH v3 1/2] fuzz/x86emul: avoid race in link farm rune

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 13:05, wrote: > Several `ln -sf` can race with each other and cause error like: > > 14:43:56 00:07:06 O: ln: cannot remove 'asm': No such file or directory > > Provide dedicated targets for soft-linking directories. > > Reported-by: Andrew Cooper > Signed-off-by: Wei Liu >

Re: [Xen-devel] [PATCH 17/19] x86/vmce, tools/libxl: expose LMCE capability in guest MSR_IA32_MCG_CAP

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 13:32, wrote: > On Fri, Feb 17, 2017 at 02:39:34PM +0800, Haozhong Zhang wrote: >> If LMCE is supported by host and "lmce = 1" is present in xl config, the >> LMCE capability will be exposed in guest MSR_IA32_MCG_CAP. By default, >> LMCE is not exposed to guest so as to keep the

Re: [Xen-devel] Xen on ARM IRQ latency and scheduler overhead

2017-02-20 Thread Punit Agrawal
Dario Faggioli writes: > On Fri, 2017-02-17 at 19:44 +, Julien Grall wrote: >> On 02/17/2017 06:40 PM, Dario Faggioli wrote: >> > Does ARM >> > have frequency scaling (I did remember something on xen-devel, but >> > I am >> > not sure whether it landed upstream)? >> >> I guess you mean the s

Re: [Xen-devel] [RFC PATCH v1 03/21] NUMA: Move arch specific NUMA code as common

2017-02-20 Thread Julien Grall
Hello Vijay, On 09/02/17 15:56, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Move some common numa code from xen/arch/x86/srat.c to xen/common/numa.c Signed-off-by: Vijaya Kumar K --- xen/arch/x86/srat.c| 54 - xen/common/numa.c

Re: [Xen-devel] [PATCH 19/19] tools/xen-mceinj: support injecting LMCE

2017-02-20 Thread Wei Liu
On Fri, Feb 17, 2017 at 02:39:36PM +0800, Haozhong Zhang wrote: > If option '-l' or '--lmce' is specified and the host supports LMCE, > xen-mceinj will inject LMCE to CPU specified by '-c' (or CPU0 if '-c' > is not present). > > Signed-off-by: Haozhong Zhang > --- > Cc: Ian Jackson > Cc: Wei Liu

Re: [Xen-devel] [RFC PATCH v1 04/21] NUMA: Refactor generic and arch specific code of numa_setup

2017-02-20 Thread Julien Grall
Hello Vijay, On 09/02/17 15:56, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K numa_setup() contains generic and arch specific code. Split numa_setup() and move architecture specific code under arch_numa_setup(). Signed-off-by: Vijaya Kumar K --- xen/arch/arm/Makefile | 1 + xen/a

Re: [Xen-devel] [RFC PATCH v1 05/21] ARM: efi: Do not delete memory node from fdt

2017-02-20 Thread Julien Grall
Hello Vijay, On 09/02/17 15:56, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K When booting in UEFI mode, UEFI passes memory information to Dom0 using EFI memory descriptor table and deletes the memory nodes from the host DT. However to fetch the memory numa node id, memory DT node should

Re: [Xen-devel] [PATCH v3 02/18] x86emul: support most memory accessing MMX/SSE{, 2, 3} insns

2017-02-20 Thread Andrew Cooper
On 15/02/17 11:07, Jan Beulich wrote: > --- a/xen/arch/x86/x86_emulate/x86_emulate.c > +++ b/xen/arch/x86/x86_emulate/x86_emulate.c > @@ -45,6 +45,8 @@ > #define ModRM (1<<6) > /* Destination is only written; never read. */ > #define Mov (1<<7) > +/* VEX/EVEX (SIMD only): 2nd sourc

Re: [Xen-devel] 4.7.2 / 4.6.5 preparations

2017-02-20 Thread Jan Beulich
>>> On 09.02.17 at 11:26, wrote: > On 09/02/17 09:52, Jan Beulich wrote: >> All, >> >> these stable releases are due in about 3 weeks time. Please indicate >> backports you consider necessary but find still missing. Commits >> already marked for backporting: >> >> e719192026 xen: credit2: never co

Re: [Xen-devel] [PATCH 17/19] x86/vmce, tools/libxl: expose LMCE capability in guest MSR_IA32_MCG_CAP

2017-02-20 Thread Wei Liu
On Mon, Feb 20, 2017 at 05:38:53AM -0700, Jan Beulich wrote: > >>> On 20.02.17 at 13:32, wrote: > > On Fri, Feb 17, 2017 at 02:39:34PM +0800, Haozhong Zhang wrote: > >> If LMCE is supported by host and "lmce = 1" is present in xl config, the > >> LMCE capability will be exposed in guest MSR_IA32_M

Re: [Xen-devel] [PATCH v2 3/3] libxc/x86: PV guests should see leaf 0xa on Intel

2017-02-20 Thread Wei Liu
On Fri, Feb 17, 2017 at 12:40:12PM -0500, Boris Ostrovsky wrote: > PV guests support VPMU and therefore leaf 0xa can be exposed > to them. > > Signed-off-by: Boris Ostrovsky I will defer this to x86 experts. ___ Xen-devel mailing list Xen-devel@lists.

Re: [Xen-devel] [PATCH v3 1/2] fuzz/x86emul: avoid race in link farm rune

2017-02-20 Thread Wei Liu
On Mon, Feb 20, 2017 at 05:37:56AM -0700, Jan Beulich wrote: > >>> On 20.02.17 at 13:05, wrote: > > Several `ln -sf` can race with each other and cause error like: > > > > 14:43:56 00:07:06 O: ln: cannot remove 'asm': No such file or directory > > > > Provide dedicated targets for soft-linking d

Re: [Xen-devel] [PATCH v2 3/3] libxc/x86: PV guests should see leaf 0xa on Intel

2017-02-20 Thread Andrew Cooper
On 20/02/17 14:15, Wei Liu wrote: > On Fri, Feb 17, 2017 at 12:40:12PM -0500, Boris Ostrovsky wrote: >> PV guests support VPMU and therefore leaf 0xa can be exposed >> to them. >> >> Signed-off-by: Boris Ostrovsky > I will defer this to x86 experts. Reviewed-by: Andrew Cooper This already happe

Re: [Xen-devel] [PATCH v2 3/3] libxc/x86: PV guests should see leaf 0xa on Intel

2017-02-20 Thread Wei Liu
On Mon, Feb 20, 2017 at 02:16:25PM +, Andrew Cooper wrote: > On 20/02/17 14:15, Wei Liu wrote: > > On Fri, Feb 17, 2017 at 12:40:12PM -0500, Boris Ostrovsky wrote: > >> PV guests support VPMU and therefore leaf 0xa can be exposed > >> to them. > >> > >> Signed-off-by: Boris Ostrovsky > > I wil

Re: [Xen-devel] [PATCH v3 1/2] fuzz/x86emul: avoid race in link farm rune

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 15:05, wrote: > On Mon, Feb 20, 2017 at 05:37:56AM -0700, Jan Beulich wrote: >> >>> On 20.02.17 at 13:05, wrote: >> > +asm: >> > + [ -L $@ ] || ln -sf $(XEN_ROOT)/xen/include/asm-x86 $@ >> > + >> > +asm/%: asm ; >> >> Is the semicolon needed here? You don't have one above ...

Re: [Xen-devel] [PATCH] build: add --with-rundir option to configure

2017-02-20 Thread Wei Liu
On Thu, Feb 16, 2017 at 08:47:07AM +0100, Juergen Gross wrote: > There have been reports that Fedora 25 uses /run instead of /var/run. > > Add a --with-rundir option ito configure to be able to specify that I've read this thread but I'm not sure if I need to take any action or all the comments ad

[Xen-devel] [PATCH v4 1/2] fuzz/x86emul: avoid race in link farm rune

2017-02-20 Thread Wei Liu
Several `ln -sf` can race with each other and cause error like: 14:43:56 00:07:06 O: ln: cannot remove 'asm': No such file or directory Provide dedicated targets for soft-linking directories. Reported-by: Andrew Cooper Signed-off-by: Wei Liu --- tools/fuzz/x86_instruction_emulator/Makefile |

[Xen-devel] [PATCH v4 0/2] Fuzz/x86emul and x86emul/test fixes

2017-02-20 Thread Wei Liu
Wei Liu (2): fuzz/x86emul: avoid race in link farm rune x86emul/test: avoid race in link farm rune tools/fuzz/x86_instruction_emulator/Makefile | 12 tools/tests/x86_emulator/Makefile| 12 2 files changed, 16 insertions(+), 8 deletions(-) -- 2.11.0 __

[Xen-devel] [PATCH v4 2/2] x86emul/test: avoid race in link farm rune

2017-02-20 Thread Wei Liu
Several `ln -sf` can race with each other. Provide dedicated targets for soft-linking directories. Signed-off-by: Wei Liu --- tools/tests/x86_emulator/Makefile | 12 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/tools/tests/x86_emulator/Makefile b/tools/tests/x86_e

Re: [Xen-devel] [PATCH] build: add --with-rundir option to configure

2017-02-20 Thread Juergen Gross
On 20/02/17 15:31, Wei Liu wrote: > On Thu, Feb 16, 2017 at 08:47:07AM +0100, Juergen Gross wrote: >> There have been reports that Fedora 25 uses /run instead of /var/run. >> >> Add a --with-rundir option ito configure to be able to specify that > > I've read this thread but I'm not sure if I need

Re: [Xen-devel] [PATCH v3 02/18] x86emul: support most memory accessing MMX/SSE{, 2, 3} insns

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 14:45, wrote: > On 15/02/17 11:07, Jan Beulich wrote: >> --- a/xen/arch/x86/x86_emulate/x86_emulate.c >> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c >> @@ -45,6 +45,8 @@ >> #define ModRM (1<<6) >> /* Destination is only written; never read. */ >> #define Mov (1

Re: [Xen-devel] [PATCH v3 07/18] x86emul: support {,V}{LD,ST}MXCSR

2017-02-20 Thread Andrew Cooper
On 15/02/17 11:11, Jan Beulich wrote: > --- a/xen/arch/x86/x86_emulate/x86_emulate.c > +++ b/xen/arch/x86/x86_emulate/x86_emulate.c > @@ -6183,6 +6200,23 @@ x86_emulate( > case X86EMUL_OPC(0x0f, 0xae): case X86EMUL_OPC_66(0x0f, 0xae): /* Grp15 > */ > switch ( modrm_reg & 7 ) >

Re: [Xen-devel] [PATCH v4 1/2] fuzz/x86emul: avoid race in link farm rune

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 15:37, wrote: > Several `ln -sf` can race with each other and cause error like: > > 14:43:56 00:07:06 O: ln: cannot remove 'asm': No such file or directory > > Provide dedicated targets for soft-linking directories. > > Reported-by: Andrew Cooper > Signed-off-by: Wei Liu R

Re: [Xen-devel] [PATCH v4 2/2] x86emul/test: avoid race in link farm rune

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 15:37, wrote: > Several `ln -sf` can race with each other. Provide dedicated targets > for soft-linking directories. > > Signed-off-by: Wei Liu Reviewed-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https:/

Re: [Xen-devel] [PATCH v3 08/18] x86emul: support {,V}MOVNTDQA

2017-02-20 Thread Andrew Cooper
On 15/02/17 11:12, Jan Beulich wrote: > @@ -6806,6 +6808,23 @@ x86_emulate( > sfence = true; > break; > > +case X86EMUL_OPC_66(0x0f38, 0x2a): /* movntdqa m128,xmm */ > +case X86EMUL_OPC_VEX_66(0x0f38, 0x2a): /* vmovntdqa mem,{x,y}mm */ > +generate_exception_i

Re: [Xen-devel] [PATCH 1/4] tools/libxendevicemodel: introduce the new library

2017-02-20 Thread Wei Liu
On Fri, Feb 17, 2017 at 10:27:06AM +, Paul Durrant wrote: > The new xendevicemodel library is intended to be used by all Xen device > models such that the only hypercall that use will be the dm_op hypercall > added by commit 524a98c2. > > This patch adds the boilerplate for the new library, wi

Re: [Xen-devel] [PATCH 4/4] tools/libxendevicemodel: add a call to restrict the handle

2017-02-20 Thread Wei Liu
On Fri, Feb 17, 2017 at 10:27:09AM +, Paul Durrant wrote: > My recent patch [1] to the Linux privcmd module introduced a mechanism > to restrict an open file handle to subsequently only accept operations for > a specified domain. > > This patch extends the libxendevicemodel API and make use of

Re: [Xen-devel] [PATCH 2/4] tools/libxendevicemodel: extract functions and add a compat layer

2017-02-20 Thread Wei Liu
On Fri, Feb 17, 2017 at 10:27:07AM +, Paul Durrant wrote: > This patch extracts all functions resulting in a dm_op hypercall from > libxenctrl and moves them into libxendevicemodel. It also adds a compat > layer into libxenctrl, which can be selected by defining > XC_WANT_COMPAT_DEVICEMODEL_API

Re: [Xen-devel] [PATCH 3/4] tools/libxendevicemodel: introduce a Linux-specific implementation

2017-02-20 Thread Wei Liu
On Fri, Feb 17, 2017 at 10:27:08AM +, Paul Durrant wrote: > My recent patch [1] to the Linux privcmd module introduced a dedicated > mechanism for making dm_op hypercalls. > > This patch adds the necessary code to libxendevicemodel to take > advantage of that mechanism if it is implemented in

Re: [Xen-devel] [PATCH 1/4] tools/libxendevicemodel: introduce the new library

2017-02-20 Thread Paul Durrant
> -Original Message- > From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: 20 February 2017 15:08 > To: Paul Durrant > Cc: xen-de...@lists.xenproject.org; Ian Jackson ; > Wei Liu ; Samuel Thibault lyon.org> > Subject: Re: [PATCH 1/4] tools/libxendevicemodel: introduce the new library > >

Re: [Xen-devel] [PATCH 1/4] tools/libxendevicemodel: introduce the new library

2017-02-20 Thread Wei Liu
On Mon, Feb 20, 2017 at 03:07:32PM +, Wei Liu wrote: > On Fri, Feb 17, 2017 at 10:27:06AM +, Paul Durrant wrote: > > The new xendevicemodel library is intended to be used by all Xen device > > models such that the only hypercall that use will be the dm_op hypercall > > added by commit 524a9

Re: [Xen-devel] [PATCH v3 07/18] x86emul: support {,V}{LD,ST}MXCSR

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 15:52, wrote: > On 15/02/17 11:11, Jan Beulich wrote: >> --- a/xen/arch/x86/x86_emulate/x86_emulate.c >> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c >> @@ -6183,6 +6200,23 @@ x86_emulate( >> case X86EMUL_OPC(0x0f, 0xae): case X86EMUL_OPC_66(0x0f, 0xae): /* Grp15 >> */ >>

Re: [Xen-devel] [PATCH v3 09/18] x86emul/test: split generic and testcase specific parts

2017-02-20 Thread Andrew Cooper
On 15/02/17 11:12, Jan Beulich wrote: > --- a/tools/tests/x86_emulator/test_x86_emulator.c > +++ b/tools/tests/x86_emulator/test_x86_emulator.c > @@ -8,19 +8,37 @@ > > #define verbose false /* Switch to true for far more logging. */ > > +static void blowfish_set_regs(struct cpu_user_regs *regs

Re: [Xen-devel] [PATCH v3 08/18] x86emul: support {,V}MOVNTDQA

2017-02-20 Thread Jan Beulich
>>> On 20.02.17 at 16:01, wrote: > On 15/02/17 11:12, Jan Beulich wrote: >> @@ -6806,6 +6808,23 @@ x86_emulate( >> sfence = true; >> break; >> >> +case X86EMUL_OPC_66(0x0f38, 0x2a): /* movntdqa m128,xmm */ >> +case X86EMUL_OPC_VEX_66(0x0f38, 0x2a): /* vmovntdqa mem,

Re: [Xen-devel] [PATCH 1/4] tools/libxendevicemodel: introduce the new library

2017-02-20 Thread Paul Durrant
> -Original Message- > From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: 20 February 2017 15:12 > To: Paul Durrant > Cc: xen-de...@lists.xenproject.org; Ian Jackson ; > Wei Liu ; Samuel Thibault lyon.org> > Subject: Re: [PATCH 1/4] tools/libxendevicemodel: introduce the new library > >

Re: [Xen-devel] [PATCH 2/4] tools/libxendevicemodel: extract functions and add a compat layer

2017-02-20 Thread Paul Durrant
> -Original Message- > From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: 20 February 2017 15:09 > To: Paul Durrant > Cc: xen-de...@lists.xenproject.org; Ian Jackson ; > Wei Liu > Subject: Re: [PATCH 2/4] tools/libxendevicemodel: extract functions and add > a compat layer > > On Fri, Feb

Re: [Xen-devel] XenGT GPU virtualization

2017-02-20 Thread anshul makkar
On 18/01/17 13:21, bharat gohil wrote: Hello I am new to GPU and GPU virtualization and found that xen support intel GPU virtualization using XenGT. I want to know, 1) What are the critical GPU command pass from xen to Dom0? 2) How the Dom0 mediator or xen validate the GPU command which is

Re: [Xen-devel] [PATCH] build: add --with-rundir option to configure

2017-02-20 Thread Andrew Cooper
On 20/02/17 14:43, Juergen Gross wrote: > On 20/02/17 15:31, Wei Liu wrote: >> On Thu, Feb 16, 2017 at 08:47:07AM +0100, Juergen Gross wrote: >>> There have been reports that Fedora 25 uses /run instead of /var/run. >>> >>> Add a --with-rundir option ito configure to be able to specify that >> I've

Re: [Xen-devel] [PATCH 1/4] tools/libxendevicemodel: introduce the new library

2017-02-20 Thread Wei Liu
On Mon, Feb 20, 2017 at 03:14:27PM +, Paul Durrant wrote: > > -Original Message- > > From: Wei Liu [mailto:wei.l...@citrix.com] > > Sent: 20 February 2017 15:12 > > To: Paul Durrant > > Cc: xen-de...@lists.xenproject.org; Ian Jackson ; > > Wei Liu ; Samuel Thibault > lyon.org> > > Sub

  1   2   >