Re: [Xen-devel] [v3 03/15] Add cmpxchg16b support for x86-64

2015-07-08 Thread Wu, Feng
> -Original Message- > From: xen-devel-boun...@lists.xen.org > [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Andrew Cooper > Sent: Thursday, June 25, 2015 2:35 AM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: george.dun...@eu.citrix.com; Zhang, Yang Z; Tian, Kevin; k...@xen.org; >

Re: [Xen-devel] [PATCH v2 07/12] x86/altp2m: add control of suppress_ve.

2015-07-08 Thread Jan Beulich
>>> On 07.07.15 at 18:24, wrote: > I'm disappointed that you think that. I respect yours, Jan's, etc. role > as maintainers, and your absolute right to reject anything you think > is inappropriate. It's clear that Jan, and now apparently you, don't > respect my abilities or desire to do good work.

Re: [Xen-devel] [v3 01/15] Vt-d Posted-intterrupt (PI) design

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM sign > > Add the design doc for VT-d PI. > > Signed-off-by: Feng Wu Reviewed-by: Kevin Tian > +So, gist of above is that, lowest priority interrupts has never been > delivered as > +"lowest priority" in physical hardware. > + > +I wi

Re: [Xen-devel] [v3 02/15] Add helper macro for X86_FEATURE_CX16 feature detection

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > Add macro cpu_has_cx16 to detect X86_FEATURE_CX16 feature. > > Signed-off-by: Feng Wu Reviewed-by: Kevin Tian ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-

Re: [Xen-devel] [PATCH v2 07/12] x86/altp2m: add control of suppress_ve.

2015-07-08 Thread Jan Beulich
>>> On 07.07.15 at 19:38, wrote: > In order to make forward progress, do the other maintainers (Jan, Andrew, > Tim) agree with the patch direction that George has suggested for this > particular patch? I for my part do, with the assumption that post-4.6 consolidation of the increasingly ugly i

Re: [Xen-devel] [v3 01/15] Vt-d Posted-intterrupt (PI) design

2015-07-08 Thread Wu, Feng
> -Original Message- > From: Tian, Kevin > Sent: Wednesday, July 08, 2015 3:21 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, > Yang Z; george.dun...@eu.citrix.com > Subject: RE: [v3 01/15] Vt-d Posted-intterrupt (PI) de

Re: [Xen-devel] [v3 04/15] iommu: Add iommu_intpost to control VT-d Posted-Interrupts feature

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt. > With VT-d Posted-Interrupts enabled, external interrupts from > direct-assigned devices can be delivered to guests without VMM > intervention when guest is running

Re: [Xen-devel] [v3 05/15] vt-d: VT-d Posted-Interrupts feature detection

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt. > With VT-d Posted-Interrupts enabled, external interrupts from > direct-assigned devices can be delivered to guests without VMM > intervention when guest is running

[Xen-devel] [PATCH 4.0 01/55] config: Enable NEED_DMA_MAP_STATE by default when SWIOTLB is selected

2015-07-08 Thread Greg Kroah-Hartman
4.0-stable review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit a6dfa128ce5c414ab46b1d690f7a1b8decb8526d upstream. A huge amount of NIC drivers use the DMA API, however if compiled under 32-bit an very important part of the DMA

Re: [Xen-devel] [PATCH v10 01/13] x86: add socket_cpumask

2015-07-08 Thread Jan Beulich
>>> On 08.07.15 at 04:43, wrote: > On Tue, Jul 07, 2015 at 06:32:55PM -0400, Boris Ostrovsky wrote: >> >@@ -245,6 +248,8 @@ static void set_cpu_sibling_map(int cpu) >> > cpumask_set_cpu(cpu, &cpu_sibling_setup_map); >> >+cpumask_set_cpu(cpu, socket_cpumask[cpu_to_socket(cpu)]); >> >> Thi

Re: [Xen-devel] Performance problem about address translation

2015-07-08 Thread xinyue
On 2015年07月08日 14:26, xinyue wrote: Very sorry for sending wrong before. On 2015年07月08日 14:13, xinyue wrote: On 2015年07月07日 19:49, Ian Campbell wrote: On Tue, 2015-07-07 at 11:24 +0800, xinyue wrote: Please don't use HTML mail and do proper ">" quoting And after analyzing the performance o

Re: [Xen-devel] [v3 06/15] vmx: Extend struct pi_desc to support VT-d Posted-Interrupts

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > Extend struct pi_desc according to VT-d Posted-Interrupts Spec. > > Signed-off-by: Feng Wu Acked-by: Kevin Tian ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xe

Re: [Xen-devel] [v3 07/15] vmx: Initialize VT-d Posted-Interrupts Descriptor

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > This patch initializes the VT-d Posted-interrupt Descriptor. > > Signed-off-by: Feng Wu Acked-by: Kevin Tian ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-d

Re: [Xen-devel] [PATCH v2] Modified RTDS scheduler to use an event-driven model instead of polling.

2015-07-08 Thread Dario Faggioli
[Trimming the Cc-list a bit, to avoid bothering Wei and Jan] On Tue, 2015-07-07 at 22:56 -0700, Meng Xu wrote: > Hi Dario, > Hi, > 2015-07-07 7:03 GMT-07:00 Dario Faggioli : > > > > On Mon, 2015-07-06 at 22:51 -0700, Meng Xu wrote: > > So, it looks to me that, as far as (1) and (2) are concerne

Re: [Xen-devel] [v3 05/15] vt-d: VT-d Posted-Interrupts feature detection

2015-07-08 Thread Wu, Feng
> -Original Message- > From: Tian, Kevin > Sent: Wednesday, July 08, 2015 3:32 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, > Yang Z; george.dun...@eu.citrix.com > Subject: RE: [v3 05/15] vt-d: VT-d Posted-Interrupts f

Re: [Xen-devel] [PATCH v25 00/15] x86/PMU: Xen PMU PV(H) support

2015-07-08 Thread Jan Beulich
>>> On 19.06.15 at 20:44, wrote: While making another scan through this series now that some more reviews from Dietmar are trickling in, I notice: > Boris Ostrovsky (15): > common/symbols: Export hypervisor symbols to privileged guest > x86/VPMU: Add public xenpmu.h > x86/VPMU: Make vpmu n

Re: [Xen-devel] [v3 03/15] Add cmpxchg16b support for x86-64

2015-07-08 Thread Jan Beulich
>>> On 08.07.15 at 09:06, wrote: > >> -Original Message- >> From: xen-devel-boun...@lists.xen.org >> [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Andrew Cooper >> Sent: Thursday, June 25, 2015 2:35 AM >> To: Wu, Feng; xen-devel@lists.xen.org >> Cc: george.dun...@eu.citrix.com;

[Xen-devel] [linux-3.4 test] 59139: regressions - FAIL

2015-07-08 Thread osstest service owner
flight 59139 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/59139/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511 Tests which are failing

Re: [Xen-devel] [v5][PATCH 10/16] tools: introduce some new parameters to set rdm policy

2015-07-08 Thread Ian Campbell
On Wed, 2015-07-08 at 08:54 +0800, Chen, Tiejun wrote: > >> +"none" is the default value and it means we don't check any reserved > >> regions > >> +and then all rdm policies would be ignored. Guest just works as before and > >> +the conflict of RDM and guest address space wouldn't be handled, and

Re: [Xen-devel] [PATCH v3 for Xen 4.6 1/4] xen: enable per-VCPU parameter settings for RTDS scheduler

2015-07-08 Thread Dario Faggioli
On Tue, 2015-07-07 at 23:06 -0700, Meng Xu wrote: > 2015-07-07 7:39 GMT-07:00 Dario Faggioli : > > On Tue, 2015-07-07 at 09:59 +0100, Jan Beulich wrote: > >> >>> On 29.06.15 at 04:44, wrote: > >> > --- a/xen/common/Makefile > >> > +++ b/xen/common/Makefile > >> > @@ -31,7 +31,6 @@ obj-y += rbtree.

Re: [Xen-devel] [v3 03/15] Add cmpxchg16b support for x86-64

2015-07-08 Thread Wu, Feng
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Wednesday, July 08, 2015 4:13 PM > To: Wu, Feng > Cc: Andrew Cooper; george.dun...@eu.citrix.com; Tian, Kevin; Zhang, Yang Z; > xen-devel@lists.xen.org; k...@xen.org > Subject: RE: [Xen-devel] [v3 03/15] Add cmpxc

Re: [Xen-devel] Xen-unstable: pci-passthrough of device using MSI-X interrupts not working after commit x86/MSI: track host and guest masking separately

2015-07-08 Thread Sander Eikelenboom
Tuesday, July 7, 2015, 6:08:25 PM, you wrote: On 26.06.15 at 17:48, wrote: >> On 2015-06-26 17:22, Jan Beulich wrote: >>> I have an idea: In >>> >>> static unsigned int startup_msi_irq(struct irq_desc *desc) >>> { >>> bool_t guest_masked = (desc->status & IRQ_GUEST) && >>>

Re: [Xen-devel] [v3 03/15] Add cmpxchg16b support for x86-64

2015-07-08 Thread Jan Beulich
>>> On 08.07.15 at 10:33, wrote: >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: Wednesday, July 08, 2015 4:13 PM >> >>> On 08.07.15 at 09:06, wrote: >> >> From: xen-devel-boun...@lists.xen.org >> >> [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Andrew Cooper >> >> Sent: Thursda

Re: [Xen-devel] traps.c:3227: GPF (0000): ffff82d080194a4d -> ffff82d080239d85 and other dom0 induced log messages

2015-07-08 Thread Sander Eikelenboom
Monday, July 6, 2015, 11:33:09 AM, you wrote: On 26.06.15 at 17:57, wrote: >> On 2015-06-26 17:51, Jan Beulich wrote: >> On 26.06.15 at 17:41, wrote: from 3.16 to 3.19 we gained a lot of these, if i remember correctly related to perf being enabled in the kernel: >>

Re: [Xen-devel] [v3 03/15] Add cmpxchg16b support for x86-64

2015-07-08 Thread Andrew Cooper
On 08/07/2015 09:12, Jan Beulich wrote: > >>> +{ +uint128_t prev; + +ASSERT(cpu_has_cx16); >>> Given that if this assertion were to fail, cmpxchg16b would fail with >>> #UD, I would hand-code a asm_fixup section which in turn panics. This >>> avoids a situation where no

Re: [Xen-devel] [v3 03/15] Add cmpxchg16b support for x86-64

2015-07-08 Thread Wu, Feng
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Wednesday, July 08, 2015 4:44 PM > To: Wu, Feng > Cc: Andrew Cooper; george.dun...@eu.citrix.com; Tian, Kevin; Zhang, Yang Z; > xen-devel@lists.xen.org; k...@xen.org > Subject: RE: [Xen-devel] [v3 03/15] Add cmpxc

[Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Jan Beulich
Rather than assuming only PV guests need special treatment (and dealing with that directly when an IRQ gets set up), keep all guest MSI IRQs masked until either the (HVM) guest unmasks them via vMSI or the (PV, PVHVM, or PVH) guest sets up an event channel for it. To not further clutter the common

Re: [Xen-devel] traps.c:3227: GPF (0000): ffff82d080194a4d -> ffff82d080239d85 and other dom0 induced log messages

2015-07-08 Thread Andrew Cooper
On 08/07/2015 09:45, Sander Eikelenboom wrote: > Monday, July 6, 2015, 11:33:09 AM, you wrote: > > On 26.06.15 at 17:57, wrote: >>> On 2015-06-26 17:51, Jan Beulich wrote: >>> On 26.06.15 at 17:41, wrote: > from 3.16 to 3.19 we gained a lot of these, if i remember correctly > rela

[Xen-devel] [linux-4.1 test] 59143: regressions - FAIL

2015-07-08 Thread osstest service owner
flight 59143 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/59143/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 15 guest-localmigrate/x10 fail REGR. vs. 59031 R

Re: [Xen-devel] traps.c:3227: GPF (0000): ffff82d080194a4d -> ffff82d080239d85 and other dom0 induced log messages

2015-07-08 Thread Jan Beulich
>>> On 08.07.15 at 10:45, wrote: > Here we go: > > (XEN) [2015-07-08 08:31:00.384] traps.c:3227: GPF (): 82d080195583 -> > 82d080239d85 > (XEN) [2015-07-08 08:31:00.384] traps.c:3227: GPF (): 82d080195583 -> > 82d080239d85 > > which leads to: > # addr2line -e /usr/lib/d

Re: [Xen-devel] [PATCH v2] net/bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6

2015-07-08 Thread Pablo Neira Ayuso
On Tue, Jul 07, 2015 at 11:34:34AM -0700, Stephen Hemminger wrote: > On Tue, 7 Jul 2015 15:55:21 +0100 > Julien Grall wrote: > > > The commit efb6de9b4ba0092b2c55f6a52d16294a8a698edd "netfilter: bridge: > > forward IPv6 fragmented packets" introduced a new function > > br_validate_ipv6 which take

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Andrew Cooper
On 08/07/2015 09:56, Jan Beulich wrote: > Rather than assuming only PV guests need special treatment (and > dealing with that directly when an IRQ gets set up), keep all guest MSI > IRQs masked until either the (HVM) guest unmasks them via vMSI or the > (PV, PVHVM, or PVH) guest sets up an event ch

Re: [Xen-devel] [v5][PATCH 10/16] tools: introduce some new parameters to set rdm policy

2015-07-08 Thread Chen, Tiejun
I'll update this next revision. And also rephrase this doc to address your comments below. FTR I think I indicated yesterday that I was satisfied with your explanation for why type=none exists as an option even at the xl level, namely that it allows us to change the default in the future. Cam

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Julien Grall
Hi, On 08/07/2015 09:56, Jan Beulich wrote: --- a/xen/include/asm-arm/irq.h +++ b/xen/include/asm-arm/irq.h @@ -47,6 +47,8 @@ int release_guest_irq(struct domain *d, void arch_move_irqs(struct vcpu *v); +#define arch_evtchn_bind_pirq(d, pirq) ((void)((d) + (pirq))) + This addition is here

Re: [Xen-devel] [v3 08/15] Suppress posting interrupts when 'SN' is set

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > Currently, we don't support urgent interrupt, all interrupts > are recognized as non-urgent interrupt, so we cannot send > posted-interrupt when 'SN' is set. > > Signed-off-by: Feng Wu > --- > v3: > use cmpxchg to test SN/ON and set O

Re: [Xen-devel] [v3 09/15] vt-d: Extend struct iremap_entry to support VT-d Posted-Interrupts

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > Extend struct iremap_entry according to VT-d Posted-Interrupts Spec. > > Signed-off-by: Feng Wu Acked-by: Kevin Tian ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.o

Re: [Xen-devel] [v5][PATCH 10/16] tools: introduce some new parameters to set rdm policy

2015-07-08 Thread Ian Campbell
On Wed, 2015-07-08 at 17:06 +0800, Chen, Tiejun wrote: > #2. Don't expose "ignore" to user and just keep "host" as the default > > He told me he would discuss this with you, but sounds he didn't do this, > or I'm missing something here? My question was regarding how xl rdm="type=none" differed

Re: [Xen-devel] [PATCH v4 1/7] libxl: get rid of the SEDF scheduler

2015-07-08 Thread Ian Campbell
On Tue, 2015-07-07 at 18:43 +0200, Dario Faggioli wrote: > only the interface is left in place, for backward > compile-time compatibility, but every attempt to > use it would throw an error. > > Signed-off-by: Dario Faggioli > --- > Cc: George Dunlap > Cc: Ian Jackson > Cc: Stefano Stabellini

[Xen-devel] [PATCH] x86: correct socket_cpumask allocation for AP

2015-07-08 Thread Chao Peng
For AP, phys_proc_id is still not valid in CPU_PREPARE notifier (cpu_smpboot_alloc), so cpu_to_socket(cpu) is not valid as well. Introduce a pre-allocated secondary_cpu_mask so that later in smp_store_cpu_info() socket_cpumask[socket] can consume it. Signed-off-by: Chao Peng --- This is targeted

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread David Vrabel
On 08/07/15 09:56, Jan Beulich wrote: > Rather than assuming only PV guests need special treatment (and > dealing with that directly when an IRQ gets set up), keep all guest MSI > IRQs masked until either the (HVM) guest unmasks them via vMSI or the > (PV, PVHVM, or PVH) guest sets up an event chan

Re: [Xen-devel] [PATCH v10 00/13] enable Cache Allocation Technology (CAT) for VMs

2015-07-08 Thread Chao Peng
On Tue, Jul 07, 2015 at 03:46:21PM +0100, Ian Campbell wrote: > On Fri, 2015-06-26 at 16:43 +0800, Chao Peng wrote: > > Chao Peng (13): > > x86: add socket_cpumask > > x86: detect and initialize Intel CAT feature > > x86: maintain COS to CBM mapping for each socket > > x86: add COS informat

Re: [Xen-devel] [v3 10/15] vt-d: Add API to update IRTE when VT-d PI is used

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > This patch adds an API which is used to update the IRTE > for posted-interrupt when guest changes MSI/MSI-X information. > > Signed-off-by: Feng Wu Acked-by: Kevin Tian , with one small comment: > +int pi_update_irte(struct vcpu *v,

Re: [Xen-devel] [PATCH v10 00/13] enable Cache Allocation Technology (CAT) for VMs

2015-07-08 Thread Wei Liu
On Wed, Jul 08, 2015 at 05:40:47PM +0800, Chao Peng wrote: > On Tue, Jul 07, 2015 at 03:46:21PM +0100, Ian Campbell wrote: > > On Fri, 2015-06-26 at 16:43 +0800, Chao Peng wrote: > > > Chao Peng (13): > > > x86: add socket_cpumask > > > x86: detect and initialize Intel CAT feature > > > x86:

Re: [Xen-devel] traps.c:3227: GPF (0000): ffff82d080194a4d -> ffff82d080239d85 and other dom0 induced log messages

2015-07-08 Thread Sander Eikelenboom
Wednesday, July 8, 2015, 10:58:02 AM, you wrote: > On 08/07/2015 09:45, Sander Eikelenboom wrote: >> Monday, July 6, 2015, 11:33:09 AM, you wrote: >> >> On 26.06.15 at 17:57, wrote: On 2015-06-26 17:51, Jan Beulich wrote: On 26.06.15 at 17:41, wrote: >> from 3.16 to 3.19 w

Re: [Xen-devel] [v3 08/15] Suppress posting interrupts when 'SN' is set

2015-07-08 Thread Wu, Feng
> -Original Message- > From: Tian, Kevin > Sent: Wednesday, July 08, 2015 5:06 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, > Yang Z; george.dun...@eu.citrix.com > Subject: RE: [v3 08/15] Suppress posting interrupts wh

Re: [Xen-devel] [v3 10/15] vt-d: Add API to update IRTE when VT-d PI is used

2015-07-08 Thread Wu, Feng
> -Original Message- > From: Tian, Kevin > Sent: Wednesday, July 08, 2015 6:00 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, > Yang Z; george.dun...@eu.citrix.com > Subject: RE: [v3 10/15] vt-d: Add API to update IRTE w

Re: [Xen-devel] [PATCH v2 07/12] x86/altp2m: add control of suppress_ve.

2015-07-08 Thread Tim Deegan
Hi, At 17:38 + on 07 Jul (1436290689), Sahita, Ravi wrote: > In order to make forward progress, do the other maintainers (Jan, > Andrew, Tim) agree with the patch direction that George has > suggested for this particular patch? I'm no longer a maintainer for this code, but FWIW I think that t

Re: [Xen-devel] [PATCH v5 2/3] arm: Allow the user to specify the GIC version

2015-07-08 Thread Ian Campbell
On Tue, 2015-07-07 at 17:22 +0100, Julien Grall wrote: > diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl > index e1632fa..11f6461 100644 > --- a/tools/libxl/libxl_types.idl > +++ b/tools/libxl/libxl_types.idl > @@ -369,6 +369,12 @@ libxl_vnode_info = Struct("vnode_info", [ >

Re: [Xen-devel] traps.c:3227: GPF (0000): ffff82d080194a4d -> ffff82d080239d85 and other dom0 induced log messages

2015-07-08 Thread Andrew Cooper
On 08/07/2015 11:04, Sander Eikelenboom wrote: > Wednesday, July 8, 2015, 10:58:02 AM, you wrote: > >> On 08/07/2015 09:45, Sander Eikelenboom wrote: >>> Monday, July 6, 2015, 11:33:09 AM, you wrote: >>> >>> On 26.06.15 at 17:57, wrote: > On 2015-06-26 17:51, Jan Beulich wrote: > O

[Xen-devel] [v6][PATCH 08/16] tools/libxc: Expose new hypercall xc_reserved_device_memory_map

2015-07-08 Thread Tiejun Chen
We will introduce the hypercall xc_reserved_device_memory_map approach to libxc. This helps us get rdm entry info according to different parameters. If flag == PCI_DEV_RDM_ALL, all entries should be exposed. Or we just expose that rdm entry specific to a SBDF. CC: Ian Jackson CC: Stefano Stabelli

[Xen-devel] [v6][PATCH 00/16] Fix RMRR

2015-07-08 Thread Tiejun Chen
v6: * Inside patch #01, add a comments to the nr_entries field inside xen_reserved_device_memory_map. Note this is from Jan. * Inside patch #10, we need rename something to make our policy reasonable "type" -> "strategy" "none" -> "ignore" and based on our discussion, we won't expose "ig

[Xen-devel] [v6][PATCH 01/16] xen: introduce XENMEM_reserved_device_memory_map

2015-07-08 Thread Tiejun Chen
From: Jan Beulich This is a prerequisite for punching holes into HVM and PVH guests' P2M to allow passing through devices that are associated with (on VT-d) RMRRs. CC: Jan Beulich CC: Yang Zhang CC: Kevin Tian Signed-off-by: Jan Beulich Signed-off-by: Tiejun Chen Acked-by: Kevin Tian --- v

[Xen-devel] [v6][PATCH 03/16] xen/passthrough: extend hypercall to support rdm reservation policy

2015-07-08 Thread Tiejun Chen
This patch extends the existing hypercall to support rdm reservation policy. We return error or just throw out a warning message depending on whether the policy is "strict" or "relaxed" when reserving RDM regions in pfn space. Note in some special cases, e.g. add a device to hwdomain, and remove a

[Xen-devel] [v6][PATCH 16/16] tools: parse to enable new rdm policy parameters

2015-07-08 Thread Tiejun Chen
This patch parses to enable user configurable parameters to specify RDM resource and according policies, Global RDM parameter: rdm = "strategy=host,reserve=strict/relaxed" Per-device RDM parameter: pci = [ 'sbdf, rdm_reserve=strict/relaxed' ] Default per-device RDM policy is 'strict', whi

[Xen-devel] [v6][PATCH 12/16] tools: introduce a new parameter to set a predefined rdm boundary

2015-07-08 Thread Tiejun Chen
Previously we always fix that predefined boundary as 2G to handle conflict between memory and rdm, but now this predefined boundar can be changes with the parameter "rdm_mem_boundary" in .cfg file. CC: Ian Jackson CC: Stefano Stabellini CC: Ian Campbell CC: Wei Liu Acked-by: Wei Liu Signed-of

[Xen-devel] [v6][PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM

2015-07-08 Thread Tiejun Chen
While building a VM, HVM domain builder provides struct hvm_info_table{} to help hvmloader. Currently it includes two fields to construct guest e820 table by hvmloader, low_mem_pgend and high_mem_pgend. So we should check them to fix any conflict with RDM. RMRR can reside in address space beyond 4

[Xen-devel] [v6][PATCH 15/16] xen/vtd: prevent from assign the device with shared rmrr

2015-07-08 Thread Tiejun Chen
Currently we're intending to cover this kind of devices with shared RMRR simply since the case of shared RMRR is a rare case according to our previous experiences. But late we can group these devices which shared rmrr, and then allow all devices within a group to be assigned to same domain. CC: Ya

[Xen-devel] [v6][PATCH 06/16] hvmloader/pci: skip reserved ranges

2015-07-08 Thread Tiejun Chen
When allocating mmio address for PCI bars, we need to make sure they don't overlap with reserved regions. CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper CC: Ian Jackson CC: Stefano Stabellini CC: Ian Campbell CC: Wei Liu Signed-off-by: Tiejun Chen --- v6: * Nothing is changed. v5: *

[Xen-devel] [v6][PATCH 14/16] xen/vtd: enable USB device assignment

2015-07-08 Thread Tiejun Chen
USB RMRR may conflict with guest BIOS region. In such case, identity mapping setup is simply skipped in previous implementation. Now we can handle this scenario cleanly with new policy mechanism so previous hack code can be removed now. CC: Yang Zhang CC: Kevin Tian Signed-off-by: Tiejun Chen A

[Xen-devel] [v6][PATCH 10/16] tools: introduce some new parameters to set rdm policy

2015-07-08 Thread Tiejun Chen
This patch introduces user configurable parameters to specify RDM resource and according policies, Global RDM parameter: rdm = "strategy=host,reserve=strict/relaxed" Per-device RDM parameter: pci = [ 'sbdf, rdm_reserve=strict/relaxed' ] Global RDM parameter, "strategy", allows user to spe

[Xen-devel] [v6][PATCH 13/16] libxl: construct e820 map with RDM information for HVM guest

2015-07-08 Thread Tiejun Chen
Here we'll construct a basic guest e820 table via XENMEM_set_memory_map. This table includes lowmem, highmem and RDMs if they exist, and hvmloader would need this info later. Note this guest e820 table would be same as before if the platform has no any RDM or we disable RDM (by default). CC: Ian

[Xen-devel] [v6][PATCH 02/16] xen/vtd: create RMRR mapping

2015-07-08 Thread Tiejun Chen
RMRR reserved regions must be setup in the pfn space with an identity mapping to reported mfn. However existing code has problem to setup correct mapping when VT-d shares EPT page table, so lead to problem when assigning devices (e.g GPU) with RMRR reported. So instead, this patch aims to setup ide

[Xen-devel] [v6][PATCH 04/16] xen: enable XENMEM_memory_map in hvm

2015-07-08 Thread Tiejun Chen
This patch enables XENMEM_memory_map in hvm. So hvmloader can use it to setup the e820 mappings. CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Tiejun Chen Reviewed-by: Tim Deegan Reviewed-by: Kevin Tian Acked-by: Jan Beulich Acked-by: George Dunlap --- v6: * Nothing is

[Xen-devel] [v6][PATCH 09/16] tools: extend xc_assign_device() to support rdm reservation policy

2015-07-08 Thread Tiejun Chen
This patch passes rdm reservation policy to xc_assign_device() so the policy is checked when assigning devices to a VM. Note this also bring some fallout to python usage of xc_assign_device(). CC: Ian Jackson CC: Stefano Stabellini CC: Ian Campbell CC: Wei Liu CC: David Scott Acked-by: Wei L

[Xen-devel] [v6][PATCH 05/16] hvmloader: get guest memory map into memory_map[]

2015-07-08 Thread Tiejun Chen
Now we get this map layout by call XENMEM_memory_map then save them into one global variable memory_map[]. It should include lowmem range, rdm range and highmem range. Note rdm range and highmem range may not exist in some cases. And here we need to check if any reserved memory conflicts with [RES

[Xen-devel] [v6][PATCH 07/16] hvmloader/e820: construct guest e820 table

2015-07-08 Thread Tiejun Chen
Now we can use that memory map to build our final e820 table but it may need to reorder all e820 entries. CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper CC: Ian Jackson CC: Stefano Stabellini CC: Ian Campbell CC: Wei Liu Signed-off-by: Tiejun Chen --- v6: * Nothing is changed. v5: *

[Xen-devel] [PATCH V4 0/3] Vm_event memory introspection helpers

2015-07-08 Thread Razvan Cojocaru
Version 4 of the series addresses V3 reviews, and consists of: [PATCH 1/3] xen/mem_access: Support for memory-content hiding [PATCH 2/3] xen/vm_event: Support for guest-requested events [PATCH 3/3] xen/vm_event: Deny register writes if refused by vm_event reply All the patches in this version hav

[Xen-devel] [PATCH V4 3/3] xen/vm_event: Deny register writes if refused by vm_event reply

2015-07-08 Thread Razvan Cojocaru
Deny register writes if a vm_client subscribed to mov_to_msr or control register write events forbids them. Currently supported for MSR, CR0, CR3 and CR4 events. Signed-off-by: Razvan Cojocaru Acked-by: George Dunlap Acked-by: Jan Beulich --- Changes since V3: - Renamed MEM_ACCESS_FLAG_DENY t

[Xen-devel] [PATCH V4 1/3] xen/mem_access: Support for memory-content hiding

2015-07-08 Thread Razvan Cojocaru
This patch adds support for memory-content hiding, by modifying the value returned by emulated instructions that read certain memory addresses that contain sensitive data. The patch only applies to cases where MEM_ACCESS_EMULATE or MEM_ACCESS_EMULATE_NOWRITE have been set to a vm_event response. S

[Xen-devel] [PATCH V4 2/3] xen/vm_event: Support for guest-requested events

2015-07-08 Thread Razvan Cojocaru
Added support for a new class of vm_events: VM_EVENT_REASON_REQUEST, sent via HVMOP_request_vm_event. The guest can request that a generic vm_event (containing only the vm_event-filled guest registers as information) be sent to userspace by setting up the correct registers and doing a VMCALL. For e

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > When guest changes its interrupt configuration (such as, vector, etc.) > for direct-assigned devices, we need to update the associated IRTE > with the new guest vector, so external interrupts from the assigned > devices can be injected

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Wu, Feng
> -Original Message- > From: Tian, Kevin > Sent: Wednesday, July 08, 2015 6:23 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, > Yang Z; george.dun...@eu.citrix.com > Subject: RE: [v3 11/15] Update IRTE according to guest

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-08 Thread Wu, Feng
> -Original Message- > From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Tuesday, June 30, 2015 1:07 AM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: k...@xen.org; jbeul...@suse.com; Tian, Kevin; Zhang, Yang Z; > george.dun...@eu.citrix.com > Subject: Re: [v3 12/15] vmx: post

[Xen-devel] "x86, arm: remove asm/spinlock.h from all architectures" removed x86's _raw_read_unlock()

2015-07-08 Thread Jan Beulich
David, I'm afraid we'll need another fixup here, even if things build fine despite the removal. Thanks, Jan ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-08 Thread Jan Beulich
>>> On 08.07.15 at 12:36, wrote: >> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] >> Sent: Tuesday, June 30, 2015 1:07 AM >> On 24/06/15 06:18, Feng Wu wrote: >> > @@ -148,11 +161,19 @@ static int vmx_vcpu_initialise(struct vcpu *v) >> > if ( v->vcpu_id == 0 ) >> > v->arch.u

Re: [Xen-devel] "x86, arm: remove asm/spinlock.h from all architectures" removed x86's _raw_read_unlock()

2015-07-08 Thread David Vrabel
On 08/07/15 11:45, Jan Beulich wrote: > David, > > I'm afraid we'll need another fixup here, even if things build fine > despite the removal. Ah, we get a generic implementation instead. Thanks for pointing this out. I'll fix it. David ___ Xen-devel

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Jan Beulich
>>> On 08.07.15 at 11:07, wrote: > On 08/07/2015 09:56, Jan Beulich wrote: >> --- a/xen/include/asm-arm/irq.h >> +++ b/xen/include/asm-arm/irq.h >> @@ -47,6 +47,8 @@ int release_guest_irq(struct domain *d, >> >> void arch_move_irqs(struct vcpu *v); >> >> +#define arch_evtchn_bind_pirq(d, pirq) (

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Jan Beulich
>>> On 08.07.15 at 11:39, wrote: > On 08/07/15 09:56, Jan Beulich wrote: >> Rather than assuming only PV guests need special treatment (and >> dealing with that directly when an IRQ gets set up), keep all guest MSI >> IRQs masked until either the (HVM) guest unmasks them via vMSI or the >> (PV, PV

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > This patch includes the following aspects: > - Add a global vector to wake up the blocked vCPU > when an interrupt is being posted to it (This > part was sugguested by Yang Zhang ). > - Adds a new per-vCPU tasklet to wakeup the bloc

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Julien Grall
On 08/07/2015 11:55, Jan Beulich wrote: On 08.07.15 at 11:07, wrote: On 08/07/2015 09:56, Jan Beulich wrote: --- a/xen/include/asm-arm/irq.h +++ b/xen/include/asm-arm/irq.h @@ -47,6 +47,8 @@ int release_guest_irq(struct domain *d, void arch_move_irqs(struct vcpu *v); +#define arch_evtch

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-08 Thread Wu, Feng
> -Original Message- > From: Tian, Kevin > Sent: Wednesday, July 08, 2015 7:00 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, > Yang Z; george.dun...@eu.citrix.com > Subject: RE: [v3 12/15] vmx: posted-interrupt handling

Re: [Xen-devel] [v3 13/15] vmx: Properly handle notification event when vCPU is running

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > When a vCPU is running in Root mode and a notification event > has been injected to it. we need to set VCPU_KICK_SOFTIRQ for > the current cpu, so the pending interrupt in PIRR will be > synced to vIRR before VM-Exit in time. > > Signe

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Wu, Feng
> -Original Message- > From: Wu, Feng > Sent: Wednesday, July 08, 2015 6:32 PM > To: Tian, Kevin; xen-devel@lists.xen.org > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, > Yang Z; george.dun...@eu.citrix.com; Wu, Feng > Subject: RE: [v3 11/15] Update IRTE accordin

Re: [Xen-devel] [PATCH] xen: Use module_pci_driver() in platform pci driver.

2015-07-08 Thread David Vrabel
On 08/07/15 06:54, Rajat Jain wrote: > Eliminate the module_init function by using module_pci_driver() This is not equivalent since this adds a useless module_exit() function. David ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.or

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread David Vrabel
On 08/07/15 11:58, Jan Beulich wrote: On 08.07.15 at 11:39, wrote: >> On 08/07/15 09:56, Jan Beulich wrote: >>> Rather than assuming only PV guests need special treatment (and >>> dealing with that directly when an IRQ gets set up), keep all guest MSI >>> IRQs masked until either the (HVM) gu

Re: [Xen-devel] [v3 14/15] Update Posted-Interrupts Descriptor during vCPU scheduling

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > The basic idea here is: > 1. When vCPU's state is RUNSTATE_running, > - set 'NV' to 'Notification Vector'. > - Clear 'SN' to accpet PI. > - set 'NDST' to the right pCPU. > 2. When vCPU's state is RUNSTATE_blocked

Re: [Xen-devel] [v3 15/15] Add a command line parameter for VT-d posted-interrupts

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > Enable VT-d Posted-Interrupts and add a command line > parameter for it. > > Signed-off-by: Feng Wu > --- > v3: > Remove the redundant "no intremp then no intpost" logic > > docs/misc/xen-command-line.markdown | 9 - > xen/d

Re: [Xen-devel] [v3 08/15] Suppress posting interrupts when 'SN' is set

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, July 08, 2015 6:11 PM > > From: Tian, Kevin > > Sent: Wednesday, July 08, 2015 5:06 PM > > > > > From: Wu, Feng > > > Sent: Wednesday, June 24, 2015 1:18 PM > > > > > > Currently, we don't support urgent interrupt, all interrupts > > > are recognized as non-urgen

Re: [Xen-devel] [PATCH v5 2/3] arm: Allow the user to specify the GIC version

2015-07-08 Thread Ian Campbell
On Wed, 2015-07-08 at 11:17 +0100, Ian Campbell wrote: > On Tue, 2015-07-07 at 17:22 +0100, Julien Grall wrote: > > diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl > > index e1632fa..11f6461 100644 > > --- a/tools/libxl/libxl_types.idl > > +++ b/tools/libxl/libxl_types.idl >

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, July 08, 2015 6:32 PM > > > > > -Original Message- > > From: Tian, Kevin > > Sent: Wednesday, July 08, 2015 6:23 PM > > To: Wu, Feng; xen-devel@lists.xen.org > > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, > > Yang Z; george.

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, July 08, 2015 7:05 PM > > > > -Original Message- > > From: Wu, Feng > > Sent: Wednesday, July 08, 2015 6:32 PM > > To: Tian, Kevin; xen-devel@lists.xen.org > > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, > > Yang Z; george.dun

Re: [Xen-devel] [PATCH v25 05/15] x86/VPMU: Initialize VPMUs with __initcall

2015-07-08 Thread Dietmar Hahn
Am Freitag 19 Juni 2015, 14:44:36 schrieb Boris Ostrovsky: > Move some VPMU initilization operations into __initcalls to avoid performing > same tests and calculations for each vcpu. > > Signed-off-by: Boris Ostrovsky > Acked-by: Jan Beulich For the Intel/VMX part: Reviewed-by: Dietmar Hahn

Re: [Xen-devel] [v6][PATCH 10/16] tools: introduce some new parameters to set rdm policy

2015-07-08 Thread Ian Jackson
Tiejun Chen writes ("[v6][PATCH 10/16] tools: introduce some new parameters to set rdm policy"): > This patch introduces user configurable parameters to specify RDM > resource and according policies, Thanks. I appreciate that I have come to this review late. While I have found the review conve

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Wu, Feng
> -Original Message- > From: Tian, Kevin > Sent: Wednesday, July 08, 2015 7:46 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, > Yang Z; george.dun...@eu.citrix.com > Subject: RE: [v3 11/15] Update IRTE according to guest

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, July 08, 2015 7:52 PM > > > > > + * - For lowest-priority interrupts, we find the destination vCPU > > > > > from the > > > > > + * guest vector using vector-hashing mechanism and return true. > > > > > This > > > > follows > > > > > + * the hardware behavi

Re: [Xen-devel] [v3 08/15] Suppress posting interrupts when 'SN' is set

2015-07-08 Thread Wu, Feng
> -Original Message- > From: Tian, Kevin > Sent: Wednesday, July 08, 2015 7:31 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, > Yang Z; george.dun...@eu.citrix.com > Subject: RE: [v3 08/15] Suppress posting interrupts wh

Re: [Xen-devel] [libvirt] [PATCH] libxl: support dom0

2015-07-08 Thread Michal Privoznik
On 07.07.2015 01:27, Jim Fehlig wrote: > On 07/06/2015 03:46 PM, Jim Fehlig wrote: >> In Xen, dom0 is really just another domain that supports ballooning, >> adding/removing devices, changing vcpu configuration, etc. This patch >> adds support to the libxl driver for managing dom0. Note that the >>

Re: [Xen-devel] [RFC PATCH v3 11/18] xen/arm: ITS: Add GITS registers emulation

2015-07-08 Thread Ian Campbell
On Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote: > From: Vijaya Kumar K > > Emulate GITS* registers and handle LPI configuration > table update trap. These need to only be exposed to a guest which has been configured with an ITS. For dom0 that means at a minimum it needs to be ba

Re: [Xen-devel] [PATCH V4 3/3] xen/vm_event: Deny register writes if refused by vm_event reply

2015-07-08 Thread Lengyel, Tamas
On Wed, Jul 8, 2015 at 6:22 AM, Razvan Cojocaru wrote: > Deny register writes if a vm_client subscribed to mov_to_msr or > control register write events forbids them. Currently supported for > MSR, CR0, CR3 and CR4 events. > > Signed-off-by: Razvan Cojocaru > Acked-by: George Dunlap > Acked-by:

Re: [Xen-devel] [PATCH v25 06/15] x86/VPMU: Initialize PMU for PV(H) guests

2015-07-08 Thread Dietmar Hahn
Am Freitag 19 Juni 2015, 14:44:37 schrieb Boris Ostrovsky: > Code for initializing/tearing down PMU for PV guests > > Signed-off-by: Boris Ostrovsky > Acked-by: Daniel De Graaf > Acked-by: Jan Beulich > Acked-by: Kevin Tian Reviewed-by: Dietmar Hahn > --- > tools/flask/policy/policy/module

  1   2   3   >