From patchwork Fri Mar 27 12:45:57 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: =?utf-8?q?Roger_Pau_Monn=C3=A9?= X-Patchwork-Id: 11462365 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id DD9B613A4 for ; Fri, 27 Mar 2020 12:47:24 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id B9E68206F2 for ; Fri, 27 Mar 2020 12:47:24 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=citrix.com header.i=@citrix.com header.b="AWhtYgIT" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org B9E68206F2 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=citrix.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1jHoNb-0000KY-7n; Fri, 27 Mar 2020 12:46:31 +0000 Received: from all-amaz-eas1.inumbo.com ([34.197.232.57] helo=us1-amaz-eas2.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1jHoNZ-0000KQ-7N for xen-devel@lists.xenproject.org; Fri, 27 Mar 2020 12:46:29 +0000 X-Inumbo-ID: f9bd276a-7028-11ea-896b-12813bfff9fa Received: from esa4.hc3370-68.iphmx.com (unknown [216.71.155.144]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS id f9bd276a-7028-11ea-896b-12813bfff9fa; Fri, 27 Mar 2020 12:46:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1585313188; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=mtsGLaUOiNBF7uacl/7sq4RwSV8bV/DVJjZ6gZDIIE4=; b=AWhtYgIT+Bfh50NnDQx0U6Z4Tef72UiLz4Dghzq7Y8+FLCV7l0fPXB3L KQGkybCfJFTdQhd41C0BI+/w+cd7D7U4rIiB/7X92MgxTIHliB/OHorme MtCqQKJI+clPo3aCcLsOrKbwwyVYDkpr+1u9pFwPNrEA2/YNkoLSIULsW 4=; Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none; spf=None smtp.pra=roger.pau@citrix.com; spf=Pass smtp.mailfrom=roger.pau@citrix.com; spf=None smtp.helo=postmaster@mail.citrix.com Received-SPF: None (esa4.hc3370-68.iphmx.com: no sender authenticity information available from domain of roger.pau@citrix.com) identity=pra; client-ip=162.221.158.21; receiver=esa4.hc3370-68.iphmx.com; envelope-from="roger.pau@citrix.com"; x-sender="roger.pau@citrix.com"; x-conformance=sidf_compatible Received-SPF: Pass (esa4.hc3370-68.iphmx.com: domain of roger.pau@citrix.com designates 162.221.158.21 as permitted sender) identity=mailfrom; client-ip=162.221.158.21; receiver=esa4.hc3370-68.iphmx.com; envelope-from="roger.pau@citrix.com"; x-sender="roger.pau@citrix.com"; x-conformance=sidf_compatible; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:209.167.231.154 ip4:178.63.86.133 ip4:195.66.111.40/30 ip4:85.115.9.32/28 ip4:199.102.83.4 ip4:192.28.146.160 ip4:192.28.146.107 ip4:216.52.6.88 ip4:216.52.6.188 ip4:162.221.158.21 ip4:162.221.156.83 ip4:168.245.78.127 ~all" Received-SPF: None (esa4.hc3370-68.iphmx.com: no sender authenticity information available from domain of postmaster@mail.citrix.com) identity=helo; client-ip=162.221.158.21; receiver=esa4.hc3370-68.iphmx.com; envelope-from="roger.pau@citrix.com"; x-sender="postmaster@mail.citrix.com"; x-conformance=sidf_compatible IronPort-SDR: tBvs5ZGX6ibhWvtEWQBT81ZZC39XqTr/pIROjZY5hXIR2SoxUdpiz5ZneairAnjPa8EA7BUN9d T7ylXhUQaf+BKxQld4tvJg58N/0B5iDzq+bqqguC9/jXkmfGcUyGjDqG5fFC50hrBmXS1fCavk 0TDvg7yY2Ht+7EUKWONe0niGdvRmalyad5sHSMmhB/+wFZX7oXmpwL2w4YQwjkI5AGD3AVWbrU saeX/jCoItDN73JtcyrjSz/dfahIReNm8tgDkrblKnUZ1Syxg5q4xyZvtIcwI3o3ffjndWYV0j crw= X-SBRS: 2.7 X-MesageID: 15405854 X-Ironport-Server: esa4.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.72,312,1580792400"; d="scan'208";a="15405854" From: Roger Pau Monne To: Date: Fri, 27 Mar 2020 13:45:57 +0100 Message-ID: <20200327124559.47992-1-roger.pau@citrix.com> X-Mailer: git-send-email 2.26.0 MIME-Version: 1.0 Subject: [Xen-devel] [PATCH v4 0/2] x86/nvmx: fixes for interrupt injection X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Kevin Tian , Jun Nakajima , Wei Liu , Andrew Cooper , Jan Beulich , Roger Pau Monne Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" Hello, osstest identified a regression caused by my earlier attempt to fix interrupt injection when using nested VMX. This series aims to fix the regression, and should unblock several osstest branches. The following report is from osstest with this series applied: http://logs.test-lab.xenproject.org/osstest/logs/149084/ Note the last patch (2/2) is the one that actually fixes the issue. Xen will always use the Ack on exit feature so patche 1/2 don't change the functionality when running a nested Xen, as it always requires SVI to be updated. Thanks, Roger. Roger Pau Monne (2): x86/nvmx: split updating RVI from SVI in nvmx_update_apicv x86/nvmx: update exit bitmap when using virtual interrupt delivery xen/arch/x86/hvm/vmx/intr.c | 21 +++++++++++------- xen/arch/x86/hvm/vmx/vvmx.c | 36 +++++++++++++++++++++++-------- xen/include/asm-x86/hvm/vmx/vmx.h | 2 ++ 3 files changed, 42 insertions(+), 17 deletions(-)