> -Original Message-
> From: xen-devel-boun...@lists.xen.org
> [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Andrew Cooper
> Sent: Thursday, June 25, 2015 2:35 AM
> To: Wu, Feng; xen-devel@lists.xen.org
> Cc: george.dun...@eu.citrix.com; Zhang, Yang Z; Tian, Kevin; k...@xen.org;
>
>>> On 07.07.15 at 18:24, wrote:
> I'm disappointed that you think that. I respect yours, Jan's, etc. role
> as maintainers, and your absolute right to reject anything you think
> is inappropriate. It's clear that Jan, and now apparently you, don't
> respect my abilities or desire to do good work.
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
sign
>
> Add the design doc for VT-d PI.
>
> Signed-off-by: Feng Wu
Reviewed-by: Kevin Tian
> +So, gist of above is that, lowest priority interrupts has never been
> delivered as
> +"lowest priority" in physical hardware.
> +
> +I wi
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> Add macro cpu_has_cx16 to detect X86_FEATURE_CX16 feature.
>
> Signed-off-by: Feng Wu
Reviewed-by: Kevin Tian
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-
>>> On 07.07.15 at 19:38, wrote:
> In order to make forward progress, do the other maintainers (Jan, Andrew,
> Tim) agree with the patch direction that George has suggested for this
> particular patch?
I for my part do, with the assumption that post-4.6 consolidation of
the increasingly ugly i
> -Original Message-
> From: Tian, Kevin
> Sent: Wednesday, July 08, 2015 3:21 PM
> To: Wu, Feng; xen-devel@lists.xen.org
> Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
> Yang Z; george.dun...@eu.citrix.com
> Subject: RE: [v3 01/15] Vt-d Posted-intterrupt (PI) de
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt.
> With VT-d Posted-Interrupts enabled, external interrupts from
> direct-assigned devices can be delivered to guests without VMM
> intervention when guest is running
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt.
> With VT-d Posted-Interrupts enabled, external interrupts from
> direct-assigned devices can be delivered to guests without VMM
> intervention when guest is running
4.0-stable review patch. If anyone has any objections, please let me know.
--
From: Konrad Rzeszutek Wilk
commit a6dfa128ce5c414ab46b1d690f7a1b8decb8526d upstream.
A huge amount of NIC drivers use the DMA API, however if
compiled under 32-bit an very important part of the DMA
>>> On 08.07.15 at 04:43, wrote:
> On Tue, Jul 07, 2015 at 06:32:55PM -0400, Boris Ostrovsky wrote:
>> >@@ -245,6 +248,8 @@ static void set_cpu_sibling_map(int cpu)
>> > cpumask_set_cpu(cpu, &cpu_sibling_setup_map);
>> >+cpumask_set_cpu(cpu, socket_cpumask[cpu_to_socket(cpu)]);
>>
>> Thi
On 2015年07月08日 14:26, xinyue wrote:
Very sorry for sending wrong before.
On 2015年07月08日 14:13, xinyue wrote:
On 2015年07月07日 19:49, Ian Campbell wrote:
On Tue, 2015-07-07 at 11:24 +0800, xinyue wrote:
Please don't use HTML mail and do proper ">" quoting
And after analyzing the performance o
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> Extend struct pi_desc according to VT-d Posted-Interrupts Spec.
>
> Signed-off-by: Feng Wu
Acked-by: Kevin Tian
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xe
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> This patch initializes the VT-d Posted-interrupt Descriptor.
>
> Signed-off-by: Feng Wu
Acked-by: Kevin Tian
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-d
[Trimming the Cc-list a bit, to avoid bothering Wei and Jan]
On Tue, 2015-07-07 at 22:56 -0700, Meng Xu wrote:
> Hi Dario,
>
Hi,
> 2015-07-07 7:03 GMT-07:00 Dario Faggioli :
> >
> > On Mon, 2015-07-06 at 22:51 -0700, Meng Xu wrote:
> > So, it looks to me that, as far as (1) and (2) are concerne
> -Original Message-
> From: Tian, Kevin
> Sent: Wednesday, July 08, 2015 3:32 PM
> To: Wu, Feng; xen-devel@lists.xen.org
> Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
> Yang Z; george.dun...@eu.citrix.com
> Subject: RE: [v3 05/15] vt-d: VT-d Posted-Interrupts f
>>> On 19.06.15 at 20:44, wrote:
While making another scan through this series now that some more
reviews from Dietmar are trickling in, I notice:
> Boris Ostrovsky (15):
> common/symbols: Export hypervisor symbols to privileged guest
> x86/VPMU: Add public xenpmu.h
> x86/VPMU: Make vpmu n
>>> On 08.07.15 at 09:06, wrote:
>
>> -Original Message-
>> From: xen-devel-boun...@lists.xen.org
>> [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Andrew Cooper
>> Sent: Thursday, June 25, 2015 2:35 AM
>> To: Wu, Feng; xen-devel@lists.xen.org
>> Cc: george.dun...@eu.citrix.com;
flight 59139 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59139/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511
Tests which are failing
On Wed, 2015-07-08 at 08:54 +0800, Chen, Tiejun wrote:
> >> +"none" is the default value and it means we don't check any reserved
> >> regions
> >> +and then all rdm policies would be ignored. Guest just works as before and
> >> +the conflict of RDM and guest address space wouldn't be handled, and
On Tue, 2015-07-07 at 23:06 -0700, Meng Xu wrote:
> 2015-07-07 7:39 GMT-07:00 Dario Faggioli :
> > On Tue, 2015-07-07 at 09:59 +0100, Jan Beulich wrote:
> >> >>> On 29.06.15 at 04:44, wrote:
> >> > --- a/xen/common/Makefile
> >> > +++ b/xen/common/Makefile
> >> > @@ -31,7 +31,6 @@ obj-y += rbtree.
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, July 08, 2015 4:13 PM
> To: Wu, Feng
> Cc: Andrew Cooper; george.dun...@eu.citrix.com; Tian, Kevin; Zhang, Yang Z;
> xen-devel@lists.xen.org; k...@xen.org
> Subject: RE: [Xen-devel] [v3 03/15] Add cmpxc
Tuesday, July 7, 2015, 6:08:25 PM, you wrote:
On 26.06.15 at 17:48, wrote:
>> On 2015-06-26 17:22, Jan Beulich wrote:
>>> I have an idea: In
>>>
>>> static unsigned int startup_msi_irq(struct irq_desc *desc)
>>> {
>>> bool_t guest_masked = (desc->status & IRQ_GUEST) &&
>>>
>>> On 08.07.15 at 10:33, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Wednesday, July 08, 2015 4:13 PM
>> >>> On 08.07.15 at 09:06, wrote:
>> >> From: xen-devel-boun...@lists.xen.org
>> >> [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Andrew Cooper
>> >> Sent: Thursda
Monday, July 6, 2015, 11:33:09 AM, you wrote:
On 26.06.15 at 17:57, wrote:
>> On 2015-06-26 17:51, Jan Beulich wrote:
>> On 26.06.15 at 17:41, wrote:
from 3.16 to 3.19 we gained a lot of these, if i remember correctly
related to
perf being enabled in the kernel:
>>
On 08/07/2015 09:12, Jan Beulich wrote:
>
>>>
+{
+uint128_t prev;
+
+ASSERT(cpu_has_cx16);
>>> Given that if this assertion were to fail, cmpxchg16b would fail with
>>> #UD, I would hand-code a asm_fixup section which in turn panics. This
>>> avoids a situation where no
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, July 08, 2015 4:44 PM
> To: Wu, Feng
> Cc: Andrew Cooper; george.dun...@eu.citrix.com; Tian, Kevin; Zhang, Yang Z;
> xen-devel@lists.xen.org; k...@xen.org
> Subject: RE: [Xen-devel] [v3 03/15] Add cmpxc
Rather than assuming only PV guests need special treatment (and
dealing with that directly when an IRQ gets set up), keep all guest MSI
IRQs masked until either the (HVM) guest unmasks them via vMSI or the
(PV, PVHVM, or PVH) guest sets up an event channel for it.
To not further clutter the common
On 08/07/2015 09:45, Sander Eikelenboom wrote:
> Monday, July 6, 2015, 11:33:09 AM, you wrote:
>
> On 26.06.15 at 17:57, wrote:
>>> On 2015-06-26 17:51, Jan Beulich wrote:
>>> On 26.06.15 at 17:41, wrote:
> from 3.16 to 3.19 we gained a lot of these, if i remember correctly
> rela
flight 59143 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59143/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 15 guest-localmigrate/x10
fail REGR. vs. 59031
R
>>> On 08.07.15 at 10:45, wrote:
> Here we go:
>
> (XEN) [2015-07-08 08:31:00.384] traps.c:3227: GPF (): 82d080195583 ->
> 82d080239d85
> (XEN) [2015-07-08 08:31:00.384] traps.c:3227: GPF (): 82d080195583 ->
> 82d080239d85
>
> which leads to:
> # addr2line -e /usr/lib/d
On Tue, Jul 07, 2015 at 11:34:34AM -0700, Stephen Hemminger wrote:
> On Tue, 7 Jul 2015 15:55:21 +0100
> Julien Grall wrote:
>
> > The commit efb6de9b4ba0092b2c55f6a52d16294a8a698edd "netfilter: bridge:
> > forward IPv6 fragmented packets" introduced a new function
> > br_validate_ipv6 which take
On 08/07/2015 09:56, Jan Beulich wrote:
> Rather than assuming only PV guests need special treatment (and
> dealing with that directly when an IRQ gets set up), keep all guest MSI
> IRQs masked until either the (HVM) guest unmasks them via vMSI or the
> (PV, PVHVM, or PVH) guest sets up an event ch
I'll update this next revision. And also rephrase this doc to address
your comments below.
FTR I think I indicated yesterday that I was satisfied with your
explanation for why type=none exists as an option even at the xl level,
namely that it allows us to change the default in the future.
Cam
Hi,
On 08/07/2015 09:56, Jan Beulich wrote:
--- a/xen/include/asm-arm/irq.h
+++ b/xen/include/asm-arm/irq.h
@@ -47,6 +47,8 @@ int release_guest_irq(struct domain *d,
void arch_move_irqs(struct vcpu *v);
+#define arch_evtchn_bind_pirq(d, pirq) ((void)((d) + (pirq)))
+
This addition is here
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> Currently, we don't support urgent interrupt, all interrupts
> are recognized as non-urgent interrupt, so we cannot send
> posted-interrupt when 'SN' is set.
>
> Signed-off-by: Feng Wu
> ---
> v3:
> use cmpxchg to test SN/ON and set O
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> Extend struct iremap_entry according to VT-d Posted-Interrupts Spec.
>
> Signed-off-by: Feng Wu
Acked-by: Kevin Tian
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.o
On Wed, 2015-07-08 at 17:06 +0800, Chen, Tiejun wrote:
> #2. Don't expose "ignore" to user and just keep "host" as the default
>
> He told me he would discuss this with you, but sounds he didn't do this,
> or I'm missing something here?
My question was regarding how xl rdm="type=none" differed
On Tue, 2015-07-07 at 18:43 +0200, Dario Faggioli wrote:
> only the interface is left in place, for backward
> compile-time compatibility, but every attempt to
> use it would throw an error.
>
> Signed-off-by: Dario Faggioli
> ---
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Stefano Stabellini
For AP, phys_proc_id is still not valid in CPU_PREPARE notifier
(cpu_smpboot_alloc), so cpu_to_socket(cpu) is not valid as well.
Introduce a pre-allocated secondary_cpu_mask so that later in
smp_store_cpu_info() socket_cpumask[socket] can consume it.
Signed-off-by: Chao Peng
---
This is targeted
On 08/07/15 09:56, Jan Beulich wrote:
> Rather than assuming only PV guests need special treatment (and
> dealing with that directly when an IRQ gets set up), keep all guest MSI
> IRQs masked until either the (HVM) guest unmasks them via vMSI or the
> (PV, PVHVM, or PVH) guest sets up an event chan
On Tue, Jul 07, 2015 at 03:46:21PM +0100, Ian Campbell wrote:
> On Fri, 2015-06-26 at 16:43 +0800, Chao Peng wrote:
> > Chao Peng (13):
> > x86: add socket_cpumask
> > x86: detect and initialize Intel CAT feature
> > x86: maintain COS to CBM mapping for each socket
> > x86: add COS informat
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> This patch adds an API which is used to update the IRTE
> for posted-interrupt when guest changes MSI/MSI-X information.
>
> Signed-off-by: Feng Wu
Acked-by: Kevin Tian , with one small comment:
> +int pi_update_irte(struct vcpu *v,
On Wed, Jul 08, 2015 at 05:40:47PM +0800, Chao Peng wrote:
> On Tue, Jul 07, 2015 at 03:46:21PM +0100, Ian Campbell wrote:
> > On Fri, 2015-06-26 at 16:43 +0800, Chao Peng wrote:
> > > Chao Peng (13):
> > > x86: add socket_cpumask
> > > x86: detect and initialize Intel CAT feature
> > > x86:
Wednesday, July 8, 2015, 10:58:02 AM, you wrote:
> On 08/07/2015 09:45, Sander Eikelenboom wrote:
>> Monday, July 6, 2015, 11:33:09 AM, you wrote:
>>
>> On 26.06.15 at 17:57, wrote:
On 2015-06-26 17:51, Jan Beulich wrote:
On 26.06.15 at 17:41, wrote:
>> from 3.16 to 3.19 w
> -Original Message-
> From: Tian, Kevin
> Sent: Wednesday, July 08, 2015 5:06 PM
> To: Wu, Feng; xen-devel@lists.xen.org
> Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
> Yang Z; george.dun...@eu.citrix.com
> Subject: RE: [v3 08/15] Suppress posting interrupts wh
> -Original Message-
> From: Tian, Kevin
> Sent: Wednesday, July 08, 2015 6:00 PM
> To: Wu, Feng; xen-devel@lists.xen.org
> Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
> Yang Z; george.dun...@eu.citrix.com
> Subject: RE: [v3 10/15] vt-d: Add API to update IRTE w
Hi,
At 17:38 + on 07 Jul (1436290689), Sahita, Ravi wrote:
> In order to make forward progress, do the other maintainers (Jan,
> Andrew, Tim) agree with the patch direction that George has
> suggested for this particular patch?
I'm no longer a maintainer for this code, but FWIW I think that t
On Tue, 2015-07-07 at 17:22 +0100, Julien Grall wrote:
> diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
> index e1632fa..11f6461 100644
> --- a/tools/libxl/libxl_types.idl
> +++ b/tools/libxl/libxl_types.idl
> @@ -369,6 +369,12 @@ libxl_vnode_info = Struct("vnode_info", [
>
On 08/07/2015 11:04, Sander Eikelenboom wrote:
> Wednesday, July 8, 2015, 10:58:02 AM, you wrote:
>
>> On 08/07/2015 09:45, Sander Eikelenboom wrote:
>>> Monday, July 6, 2015, 11:33:09 AM, you wrote:
>>>
>>> On 26.06.15 at 17:57, wrote:
> On 2015-06-26 17:51, Jan Beulich wrote:
> O
We will introduce the hypercall xc_reserved_device_memory_map
approach to libxc. This helps us get rdm entry info according to
different parameters. If flag == PCI_DEV_RDM_ALL, all entries
should be exposed. Or we just expose that rdm entry specific to
a SBDF.
CC: Ian Jackson
CC: Stefano Stabelli
v6:
* Inside patch #01, add a comments to the nr_entries field inside
xen_reserved_device_memory_map. Note this is from Jan.
* Inside patch #10, we need rename something to make our policy reasonable
"type" -> "strategy"
"none" -> "ignore"
and based on our discussion, we won't expose "ig
From: Jan Beulich
This is a prerequisite for punching holes into HVM and PVH guests' P2M
to allow passing through devices that are associated with (on VT-d)
RMRRs.
CC: Jan Beulich
CC: Yang Zhang
CC: Kevin Tian
Signed-off-by: Jan Beulich
Signed-off-by: Tiejun Chen
Acked-by: Kevin Tian
---
v
This patch extends the existing hypercall to support rdm reservation policy.
We return error or just throw out a warning message depending on whether
the policy is "strict" or "relaxed" when reserving RDM regions in pfn space.
Note in some special cases, e.g. add a device to hwdomain, and remove a
This patch parses to enable user configurable parameters to specify
RDM resource and according policies,
Global RDM parameter:
rdm = "strategy=host,reserve=strict/relaxed"
Per-device RDM parameter:
pci = [ 'sbdf, rdm_reserve=strict/relaxed' ]
Default per-device RDM policy is 'strict', whi
Previously we always fix that predefined boundary as 2G to handle
conflict between memory and rdm, but now this predefined boundar
can be changes with the parameter "rdm_mem_boundary" in .cfg file.
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
Acked-by: Wei Liu
Signed-of
While building a VM, HVM domain builder provides struct hvm_info_table{}
to help hvmloader. Currently it includes two fields to construct guest
e820 table by hvmloader, low_mem_pgend and high_mem_pgend. So we should
check them to fix any conflict with RDM.
RMRR can reside in address space beyond 4
Currently we're intending to cover this kind of devices
with shared RMRR simply since the case of shared RMRR is
a rare case according to our previous experiences. But
late we can group these devices which shared rmrr, and
then allow all devices within a group to be assigned to
same domain.
CC: Ya
When allocating mmio address for PCI bars, we need to make
sure they don't overlap with reserved regions.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
Signed-off-by: Tiejun Chen
---
v6:
* Nothing is changed.
v5:
*
USB RMRR may conflict with guest BIOS region. In such case, identity
mapping setup is simply skipped in previous implementation. Now we
can handle this scenario cleanly with new policy mechanism so previous
hack code can be removed now.
CC: Yang Zhang
CC: Kevin Tian
Signed-off-by: Tiejun Chen
A
This patch introduces user configurable parameters to specify RDM
resource and according policies,
Global RDM parameter:
rdm = "strategy=host,reserve=strict/relaxed"
Per-device RDM parameter:
pci = [ 'sbdf, rdm_reserve=strict/relaxed' ]
Global RDM parameter, "strategy", allows user to spe
Here we'll construct a basic guest e820 table via
XENMEM_set_memory_map. This table includes lowmem, highmem
and RDMs if they exist, and hvmloader would need this info
later.
Note this guest e820 table would be same as before if the
platform has no any RDM or we disable RDM (by default).
CC: Ian
RMRR reserved regions must be setup in the pfn space with an identity
mapping to reported mfn. However existing code has problem to setup
correct mapping when VT-d shares EPT page table, so lead to problem
when assigning devices (e.g GPU) with RMRR reported. So instead, this
patch aims to setup ide
This patch enables XENMEM_memory_map in hvm. So hvmloader can
use it to setup the e820 mappings.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Tiejun Chen
Reviewed-by: Tim Deegan
Reviewed-by: Kevin Tian
Acked-by: Jan Beulich
Acked-by: George Dunlap
---
v6:
* Nothing is
This patch passes rdm reservation policy to xc_assign_device() so the policy
is checked when assigning devices to a VM.
Note this also bring some fallout to python usage of xc_assign_device().
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
CC: David Scott
Acked-by: Wei L
Now we get this map layout by call XENMEM_memory_map then
save them into one global variable memory_map[]. It should
include lowmem range, rdm range and highmem range. Note
rdm range and highmem range may not exist in some cases.
And here we need to check if any reserved memory conflicts with
[RES
Now we can use that memory map to build our final
e820 table but it may need to reorder all e820
entries.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
CC: Ian Jackson
CC: Stefano Stabellini
CC: Ian Campbell
CC: Wei Liu
Signed-off-by: Tiejun Chen
---
v6:
* Nothing is changed.
v5:
*
Version 4 of the series addresses V3 reviews, and consists of:
[PATCH 1/3] xen/mem_access: Support for memory-content hiding
[PATCH 2/3] xen/vm_event: Support for guest-requested events
[PATCH 3/3] xen/vm_event: Deny register writes if refused by
vm_event reply
All the patches in this version hav
Deny register writes if a vm_client subscribed to mov_to_msr or
control register write events forbids them. Currently supported for
MSR, CR0, CR3 and CR4 events.
Signed-off-by: Razvan Cojocaru
Acked-by: George Dunlap
Acked-by: Jan Beulich
---
Changes since V3:
- Renamed MEM_ACCESS_FLAG_DENY t
This patch adds support for memory-content hiding, by modifying the
value returned by emulated instructions that read certain memory
addresses that contain sensitive data. The patch only applies to
cases where MEM_ACCESS_EMULATE or MEM_ACCESS_EMULATE_NOWRITE have
been set to a vm_event response.
S
Added support for a new class of vm_events: VM_EVENT_REASON_REQUEST,
sent via HVMOP_request_vm_event. The guest can request that a
generic vm_event (containing only the vm_event-filled guest registers
as information) be sent to userspace by setting up the correct
registers and doing a VMCALL. For e
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> When guest changes its interrupt configuration (such as, vector, etc.)
> for direct-assigned devices, we need to update the associated IRTE
> with the new guest vector, so external interrupts from the assigned
> devices can be injected
> -Original Message-
> From: Tian, Kevin
> Sent: Wednesday, July 08, 2015 6:23 PM
> To: Wu, Feng; xen-devel@lists.xen.org
> Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
> Yang Z; george.dun...@eu.citrix.com
> Subject: RE: [v3 11/15] Update IRTE according to guest
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Tuesday, June 30, 2015 1:07 AM
> To: Wu, Feng; xen-devel@lists.xen.org
> Cc: k...@xen.org; jbeul...@suse.com; Tian, Kevin; Zhang, Yang Z;
> george.dun...@eu.citrix.com
> Subject: Re: [v3 12/15] vmx: post
David,
I'm afraid we'll need another fixup here, even if things build fine
despite the removal.
Thanks, Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
>>> On 08.07.15 at 12:36, wrote:
>> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
>> Sent: Tuesday, June 30, 2015 1:07 AM
>> On 24/06/15 06:18, Feng Wu wrote:
>> > @@ -148,11 +161,19 @@ static int vmx_vcpu_initialise(struct vcpu *v)
>> > if ( v->vcpu_id == 0 )
>> > v->arch.u
On 08/07/15 11:45, Jan Beulich wrote:
> David,
>
> I'm afraid we'll need another fixup here, even if things build fine
> despite the removal.
Ah, we get a generic implementation instead. Thanks for pointing this
out. I'll fix it.
David
___
Xen-devel
>>> On 08.07.15 at 11:07, wrote:
> On 08/07/2015 09:56, Jan Beulich wrote:
>> --- a/xen/include/asm-arm/irq.h
>> +++ b/xen/include/asm-arm/irq.h
>> @@ -47,6 +47,8 @@ int release_guest_irq(struct domain *d,
>>
>> void arch_move_irqs(struct vcpu *v);
>>
>> +#define arch_evtchn_bind_pirq(d, pirq) (
>>> On 08.07.15 at 11:39, wrote:
> On 08/07/15 09:56, Jan Beulich wrote:
>> Rather than assuming only PV guests need special treatment (and
>> dealing with that directly when an IRQ gets set up), keep all guest MSI
>> IRQs masked until either the (HVM) guest unmasks them via vMSI or the
>> (PV, PV
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> This patch includes the following aspects:
> - Add a global vector to wake up the blocked vCPU
> when an interrupt is being posted to it (This
> part was sugguested by Yang Zhang ).
> - Adds a new per-vCPU tasklet to wakeup the bloc
On 08/07/2015 11:55, Jan Beulich wrote:
On 08.07.15 at 11:07, wrote:
On 08/07/2015 09:56, Jan Beulich wrote:
--- a/xen/include/asm-arm/irq.h
+++ b/xen/include/asm-arm/irq.h
@@ -47,6 +47,8 @@ int release_guest_irq(struct domain *d,
void arch_move_irqs(struct vcpu *v);
+#define arch_evtch
> -Original Message-
> From: Tian, Kevin
> Sent: Wednesday, July 08, 2015 7:00 PM
> To: Wu, Feng; xen-devel@lists.xen.org
> Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
> Yang Z; george.dun...@eu.citrix.com
> Subject: RE: [v3 12/15] vmx: posted-interrupt handling
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> When a vCPU is running in Root mode and a notification event
> has been injected to it. we need to set VCPU_KICK_SOFTIRQ for
> the current cpu, so the pending interrupt in PIRR will be
> synced to vIRR before VM-Exit in time.
>
> Signe
> -Original Message-
> From: Wu, Feng
> Sent: Wednesday, July 08, 2015 6:32 PM
> To: Tian, Kevin; xen-devel@lists.xen.org
> Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
> Yang Z; george.dun...@eu.citrix.com; Wu, Feng
> Subject: RE: [v3 11/15] Update IRTE accordin
On 08/07/15 06:54, Rajat Jain wrote:
> Eliminate the module_init function by using module_pci_driver()
This is not equivalent since this adds a useless module_exit() function.
David
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.or
On 08/07/15 11:58, Jan Beulich wrote:
On 08.07.15 at 11:39, wrote:
>> On 08/07/15 09:56, Jan Beulich wrote:
>>> Rather than assuming only PV guests need special treatment (and
>>> dealing with that directly when an IRQ gets set up), keep all guest MSI
>>> IRQs masked until either the (HVM) gu
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> The basic idea here is:
> 1. When vCPU's state is RUNSTATE_running,
> - set 'NV' to 'Notification Vector'.
> - Clear 'SN' to accpet PI.
> - set 'NDST' to the right pCPU.
> 2. When vCPU's state is RUNSTATE_blocked
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> Enable VT-d Posted-Interrupts and add a command line
> parameter for it.
>
> Signed-off-by: Feng Wu
> ---
> v3:
> Remove the redundant "no intremp then no intpost" logic
>
> docs/misc/xen-command-line.markdown | 9 -
> xen/d
> From: Wu, Feng
> Sent: Wednesday, July 08, 2015 6:11 PM
> > From: Tian, Kevin
> > Sent: Wednesday, July 08, 2015 5:06 PM
> >
> > > From: Wu, Feng
> > > Sent: Wednesday, June 24, 2015 1:18 PM
> > >
> > > Currently, we don't support urgent interrupt, all interrupts
> > > are recognized as non-urgen
On Wed, 2015-07-08 at 11:17 +0100, Ian Campbell wrote:
> On Tue, 2015-07-07 at 17:22 +0100, Julien Grall wrote:
> > diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
> > index e1632fa..11f6461 100644
> > --- a/tools/libxl/libxl_types.idl
> > +++ b/tools/libxl/libxl_types.idl
>
> From: Wu, Feng
> Sent: Wednesday, July 08, 2015 6:32 PM
>
>
>
> > -Original Message-
> > From: Tian, Kevin
> > Sent: Wednesday, July 08, 2015 6:23 PM
> > To: Wu, Feng; xen-devel@lists.xen.org
> > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
> > Yang Z; george.
> From: Wu, Feng
> Sent: Wednesday, July 08, 2015 7:05 PM
>
>
> > -Original Message-
> > From: Wu, Feng
> > Sent: Wednesday, July 08, 2015 6:32 PM
> > To: Tian, Kevin; xen-devel@lists.xen.org
> > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
> > Yang Z; george.dun
Am Freitag 19 Juni 2015, 14:44:36 schrieb Boris Ostrovsky:
> Move some VPMU initilization operations into __initcalls to avoid performing
> same tests and calculations for each vcpu.
>
> Signed-off-by: Boris Ostrovsky
> Acked-by: Jan Beulich
For the Intel/VMX part:
Reviewed-by: Dietmar Hahn
Tiejun Chen writes ("[v6][PATCH 10/16] tools: introduce some new parameters to
set rdm policy"):
> This patch introduces user configurable parameters to specify RDM
> resource and according policies,
Thanks.
I appreciate that I have come to this review late. While I have found
the review conve
> -Original Message-
> From: Tian, Kevin
> Sent: Wednesday, July 08, 2015 7:46 PM
> To: Wu, Feng; xen-devel@lists.xen.org
> Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
> Yang Z; george.dun...@eu.citrix.com
> Subject: RE: [v3 11/15] Update IRTE according to guest
> From: Wu, Feng
> Sent: Wednesday, July 08, 2015 7:52 PM
> > > > > + * - For lowest-priority interrupts, we find the destination vCPU
> > > > > from the
> > > > > + * guest vector using vector-hashing mechanism and return true.
> > > > > This
> > > > follows
> > > > > + * the hardware behavi
> -Original Message-
> From: Tian, Kevin
> Sent: Wednesday, July 08, 2015 7:31 PM
> To: Wu, Feng; xen-devel@lists.xen.org
> Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang,
> Yang Z; george.dun...@eu.citrix.com
> Subject: RE: [v3 08/15] Suppress posting interrupts wh
On 07.07.2015 01:27, Jim Fehlig wrote:
> On 07/06/2015 03:46 PM, Jim Fehlig wrote:
>> In Xen, dom0 is really just another domain that supports ballooning,
>> adding/removing devices, changing vcpu configuration, etc. This patch
>> adds support to the libxl driver for managing dom0. Note that the
>>
On Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote:
> From: Vijaya Kumar K
>
> Emulate GITS* registers and handle LPI configuration
> table update trap.
These need to only be exposed to a guest which has been configured with
an ITS. For dom0 that means at a minimum it needs to be ba
On Wed, Jul 8, 2015 at 6:22 AM, Razvan Cojocaru
wrote:
> Deny register writes if a vm_client subscribed to mov_to_msr or
> control register write events forbids them. Currently supported for
> MSR, CR0, CR3 and CR4 events.
>
> Signed-off-by: Razvan Cojocaru
> Acked-by: George Dunlap
> Acked-by:
Am Freitag 19 Juni 2015, 14:44:37 schrieb Boris Ostrovsky:
> Code for initializing/tearing down PMU for PV guests
>
> Signed-off-by: Boris Ostrovsky
> Acked-by: Daniel De Graaf
> Acked-by: Jan Beulich
> Acked-by: Kevin Tian
Reviewed-by: Dietmar Hahn
> ---
> tools/flask/policy/policy/module
1 - 100 of 279 matches
Mail list logo