Re: [Xen-devel] [PATCH v2 2/3] x86/VPMU: No need to check whether VPMU quirk is needed on Intel

2015-12-02 Thread Tian, Kevin
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] > Sent: Wednesday, December 02, 2015 12:50 AM > > We only support family 6 so quirk handling is always needed. what about you adding other family support in the future then you'll add back below quirk check? > > Signed-off-by: Boris Os

Re: [Xen-devel] [PATCH v2 0/3] VPMU fixes

2015-12-02 Thread Tian, Kevin
> From: Dietmar Hahn [mailto:dietmar.h...@ts.fujitsu.com] > Sent: Wednesday, December 02, 2015 5:21 PM > > Am Mittwoch 02 Dezember 2015, 02:20:49 schrieb Tian, Kevin: > > > From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] > > > Sent: Wednesd

Re: [Xen-devel] [xen-unstable test] 65141: regressions - FAIL

2015-12-02 Thread Tian, Kevin
> From: Ian Campbell [mailto:ian.campb...@citrix.com] > Sent: Wednesday, December 02, 2015 9:51 PM > > > > According to > > http://osstest.test-lab.xenproject.org/~osstest/pub/results/bisect/xen-un > > stable/test-amd64-amd64-qemuu-nested-intel.debian-hvm-install--l1 > > --l2.html > > it was unable

Re: [Xen-devel] [PATCH] iommu/quirk: disable shared EPT for Sandybridge and earlier processors.

2015-12-02 Thread Tian, Kevin
> From: Tian, Kevin > Sent: Thursday, December 03, 2015 9:20 AM > > > From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > > Sent: Thursday, November 26, 2015 9:56 PM > > > > On 26/11/15 13:48, Malcolm Crossley wrote: > > > On 26/11/15 13:46, Jan Beu

Re: [Xen-devel] [PATCH] iommu/quirk: disable shared EPT for Sandybridge and earlier processors.

2015-12-02 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Thursday, November 26, 2015 9:56 PM > > On 26/11/15 13:48, Malcolm Crossley wrote: > > On 26/11/15 13:46, Jan Beulich wrote: > > On 25.11.15 at 11:28, wrote: > >>> The problem is that SandyBridge IOMMUs advertise 2M support and

Re: [Xen-devel] [PATCHv2 2/3] mm: don't free pages until mm locks are released

2015-12-01 Thread Tian, Kevin
> From: David Vrabel [mailto:david.vra...@citrix.com] > Sent: Saturday, November 14, 2015 2:50 AM > > If a page is freed without translations being invalidated, and the page is > subsequently allocated to another domain, a guest with a cached > translation will still be able to access the page. >

Re: [Xen-devel] [PATCHv2 1/3] x86/ept: remove unnecessary sync after resolving misconfigured entries

2015-12-01 Thread Tian, Kevin
> From: David Vrabel [mailto:david.vra...@citrix.com] > Sent: Saturday, November 14, 2015 2:50 AM > > When using EPT, type changes are done with the following steps: > > 1. Set entry as invalid (misconfigured) by settings a reserved memory > type. > > 2. Flush all EPT and combined translations (

Re: [Xen-devel] [RFC PATCHv2 0/3]: x86/ept: reduce translation invalidation impact

2015-12-01 Thread Tian, Kevin
> From: David Vrabel [mailto:david.vra...@citrix.com] > Sent: Saturday, November 14, 2015 2:50 AM > > This RFC series improves the performance of EPT by reducing the impact > of the translation invalidations (ept_sync_domain()). Two approaches > are used: > > a) Removing unnecessary invalidation

Re: [Xen-devel] [PATCH v2] x86/vmx: enable PML by default

2015-12-01 Thread Tian, Kevin
> From: Kai Huang [mailto:kai.hu...@linux.intel.com] > Sent: Friday, November 27, 2015 4:52 PM > > Since PML series were merged (but disabled by default) we have conducted lots > of > PML tests (live migration, GUI display) and PML has been working fine, > therefore > turn it on by default. > >

Re: [Xen-devel] Skylake: VT-d and other error messages

2015-12-01 Thread Tian, Kevin
Eric, could you provide your motherboard information and as Andrew pointed out what’s f0:1f.0? From: Andrew Cooper [mailto:andrew.coop...@citrix.com] Sent: Sunday, November 29, 2015 6:15 AM To: Eric Shelton; xen-devel; Zhang, Yang Z; Tian, Kevin; Keir Fraser; Jan Beulich Subject: Re: Skylake

Re: [Xen-devel] [PATCH] x86/HVM: XSETBV intercept needs to check CPL on SVM only

2015-12-01 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Friday, November 27, 2015 7:02 PM > > VMX doesn't need a software CPL check on the XSETBV intercept, and > SVM can do that check without resorting to hvm_get_segment_register(). > > Clean up what is left of hvm_handle_xsetbv(), namely make it

Re: [Xen-devel] [PATCH v2 0/3] VPMU fixes

2015-12-01 Thread Tian, Kevin
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] > Sent: Wednesday, December 02, 2015 12:50 AM > > * Limit VPMU support to PMU versions 2, 3 and 4 (emulated at version 3 level) > * Always implement family 6 VPMU quirk. > ==> Intel folks: is the quirk needed for all family 6 processor

Re: [Xen-devel] [PATCH] iommu/quirk: disable shared EPT for Sandybridge and earlier processors.

2015-11-25 Thread Tian, Kevin
> From: Malcolm Crossley [mailto:malcolm.cross...@citrix.com] > Sent: Wednesday, November 25, 2015 11:59 PM > > On 25/11/15 15:38, Jan Beulich wrote: > On 25.11.15 at 16:13, wrote: > >> On 25/11/15 10:49, Jan Beulich wrote: > >> On 25.11.15 at 11:28, wrote: > On 24/11/15 17:41, Jan

Re: [Xen-devel] [PATCH v8 03/21] xen/x86: allow disabling the emulated local apic

2015-11-25 Thread Tian, Kevin
> From: Roger Pau Monne [mailto:roger@citrix.com] > Sent: Saturday, November 07, 2015 12:06 AM > > Signed-off-by: Roger Pau Monné > Reviewed-by: Andrew Cooper > Acked-by: Jan Beulich > Cc: Jan Beulich > Cc: Andrew Cooper > Cc: Jun Nakajima > Cc: Eddie Dong > Cc: Kevin Tian Acked-by: K

Re: [Xen-devel] [PATCH v8 02/21] xen/vlapic: fixes for HVM code when running without a vlapic

2015-11-25 Thread Tian, Kevin
> From: Roger Pau Monne [mailto:roger@citrix.com] > Sent: Saturday, November 07, 2015 12:06 AM > > The HVM related code (SVM, VMX) generally assumed that a local apic is > always present. With the introduction of a HVM mode were the local apic can > be removed, some of this broken code paths a

Re: [Xen-devel] [PATCH v9 11/17] vt-d: Add API to update IRTE when VT-d PI is used

2015-11-24 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Tuesday, November 24, 2015 4:52 PM > > >>> On 24.11.15 at 08:56, wrote: > >> From: Wu, Feng > >> Sent: Tuesday, November 24, 2015 3:54 PM > >> > From: Tian, Kevin > >> > Sent: T

Re: [Xen-devel] [PATCH v9 11/17] vt-d: Add API to update IRTE when VT-d PI is used

2015-11-23 Thread Tian, Kevin
> From: Wu, Feng > Sent: Tuesday, November 24, 2015 3:54 PM > > > > -Original Message----- > > From: Tian, Kevin > > Sent: Tuesday, November 24, 2015 3:45 PM > > To: Wu, Feng ; xen-devel@lists.xen.org > > Cc: Zhang, Yang Z ; Keir Fraser ; Jan &g

Re: [Xen-devel] [PATCH v9 08/17] vmx: Suppress posting interrupts when 'SN' is set

2015-11-23 Thread Tian, Kevin
> From: Wu, Feng > Sent: Tuesday, November 24, 2015 3:47 PM > > > > -Original Message----- > > From: Tian, Kevin > > Sent: Tuesday, November 24, 2015 3:30 PM > > To: Wu, Feng ; xen-devel@lists.xen.org > > Cc: Keir Fraser ; Jan Beulich ; Andrew &g

Re: [Xen-devel] [PATCH v9 16/17] VT-d: Dump the posted format IRTE

2015-11-23 Thread Tian, Kevin
> From: Wu, Feng > Sent: Tuesday, November 03, 2015 4:43 PM > > Add the utility to dump the posted format IRTE. > > CC: Yang Zhang > CC: Kevin Tian > Signed-off-by: Feng Wu Acked-by: Kevin Tian ___ Xen-devel mailing list Xen-devel@lists.xen.org ht

Re: [Xen-devel] [PATCH v9 11/17] vt-d: Add API to update IRTE when VT-d PI is used

2015-11-23 Thread Tian, Kevin
> From: Wu, Feng > Sent: Tuesday, November 03, 2015 4:43 PM > > This patch adds an API which is used to update the IRTE > for posted-interrupt when guest changes MSI/MSI-X information. > > CC: Yang Zhang > CC: Kevin Tian > CC: Keir Fraser > CC: Jan Beulich > CC: Andrew Cooper > Signed-off-by

Re: [Xen-devel] [PATCH v9 09/17] VT-d: Remove pointless casts

2015-11-23 Thread Tian, Kevin
> From: Wu, Feng > Sent: Tuesday, November 03, 2015 4:43 PM > > Remove pointless casts. > > CC: Yang Zhang > CC: Kevin Tian > Suggested-by: Jan Beulich > Signed-off-by: Feng Wu > Reviewed-by: Konrad Rzeszutek Wilk Acked-by: Kevin Tian ___ Xen-de

Re: [Xen-devel] [PATCH v9 08/17] vmx: Suppress posting interrupts when 'SN' is set

2015-11-23 Thread Tian, Kevin
> From: Wu, Feng > Sent: Tuesday, November 03, 2015 4:43 PM N' is set > > Currently, we don't support urgent interrupt, all interrupts > are recognized as non-urgent interrupt, so we cannot send > posted-interrupt when 'SN' is set. > > CC: Kevin Tian > CC: Keir Fraser > CC: Jan Beulich > CC: A

Re: [Xen-devel] [PATCH v9 06/17] vmx: Add some helper functions for Posted-Interrupts

2015-11-23 Thread Tian, Kevin
> From: Wu, Feng > Sent: Tuesday, November 03, 2015 4:43 PM > > This patch adds some helper functions to manipulate the > Posted-Interrupts Descriptor. > > CC: Kevin Tian > CC: Keir Fraser > CC: Jan Beulich > CC: Andrew Cooper > Signed-off-by: Feng Wu > Reviewed-by: Konrad Rzeszutek Wilk A

Re: [Xen-devel] [PATCH v9 04/17] vt-d: VT-d Posted-Interrupts feature detection

2015-11-23 Thread Tian, Kevin
> From: Wu, Feng > Sent: Tuesday, November 03, 2015 4:43 PM > > VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt. > With VT-d Posted-Interrupts enabled, external interrupts from > direct-assigned devices can be delivered to guests without VMM > intervention when guest is runni

Re: [Xen-devel] [PATCH v9 01/17] VT-d Posted-intterrupt (PI) design

2015-11-23 Thread Tian, Kevin
> From: Wu, Feng > Sent: Tuesday, November 03, 2015 4:43 PM > > > diff --git a/docs/misc/vtd-pi.txt b/docs/misc/vtd-pi.txt > new file mode 100644 > index 000..f9b4637 > --- /dev/null > +++ b/docs/misc/vtd-pi.txt > @@ -0,0 +1,329 @@ > +Authors: Feng Wu > + > +VT-d Posted-interrupt (PI) design

Re: [Xen-devel] [PATCH v9 01/17] VT-d Posted-intterrupt (PI) design

2015-11-23 Thread Tian, Kevin
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > Sent: Tuesday, November 10, 2015 10:52 PM > > > > +Here are what we do for the blocked vCPU: > > +1. Define a per-cpu list 'pi_blocked_vcpu', which stored the blocked > > +vCPU on the pCPU. > > +2. When the vCPU is going to block, insert t

Re: [Xen-devel] [PATCH 2/3] VMX: allocate VMCS pages from domain heap

2015-11-23 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, November 23, 2015 10:28 PM > > >>> On 21.10.15 at 05:16, wrote: > >> From: Jan Beulich [mailto:jbeul...@suse.com] > >> Sent: Tuesday, October 20, 2015 6:36 PM > >> >>> On 20.10.15 at 12:12, wrote: > >> > On 19/10/15 16:22, Jan Beuli

Re: [Xen-devel] [PATCH] VMX: fix/adjust trap injection

2015-11-23 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, November 23, 2015 8:49 PM > > In the course of investigating the 4.1.6 backport issue of the XSA-156 > patch I realized that #DB injection has always been broken, but with it > now getting always intercepted the problem has got worse:

Re: [Xen-devel] [PATCH] x86/HVM: type adjustments

2015-11-23 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, November 23, 2015 9:51 PM > > - constify struct hvm_trap * function parameters > - width reduce and shuffle some struct hvm_trap members > - use bool_t for boolean fields struct hvm_function_table > - use unsigned for struct hvm_functi

Re: [Xen-devel] [PATCH] MAINTAINERS: change the vt-d maintainer

2015-11-23 Thread Tian, Kevin
> From: Zhang, Yang Z > Sent: Monday, November 23, 2015 1:35 PM > > add Feng as the new maintainer of VT-d stuff > > Signed-off-by: Yang Zhang Acked-by: Kevin Tian ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [Intel-gfx] [Announcement] 2015-Q3 release of XenGT - a Mediated Graphics Passthrough Solution from Intel

2015-11-20 Thread Tian, Kevin
> From: Gerd Hoffmann [mailto:kra...@redhat.com] > Sent: Friday, November 20, 2015 4:26 PM > > Hi, > > > > iGVT-g_Setup_Guide.txt mentions a "Indirect Display Mode", but doesn't > > > explain how the guest framebuffer can be accessed then. > > > > You can check "fb_decoder.h". One thing to clar

Re: [Xen-devel] [Intel-gfx] [Announcement] 2015-Q3 release of XenGT - a Mediated Graphics Passthrough Solution from Intel

2015-11-20 Thread Tian, Kevin
> From: Tian, Kevin > Sent: Friday, November 20, 2015 3:10 PM > > > > > > > > The proposal is therefore that GPU vendors can expose vGPUs to > > > > userspace, and thus to QEMU, using the VFIO API. For instance, vfio > > > > supports modul

Re: [Xen-devel] [Intel-gfx] [Announcement] 2015-Q3 release of XenGT - a Mediated Graphics Passthrough Solution from Intel

2015-11-19 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Friday, November 20, 2015 4:03 AM > > > > > > > The proposal is therefore that GPU vendors can expose vGPUs to > > > userspace, and thus to QEMU, using the VFIO API. For instance, vfio > > > supports modular bus drivers and IOMMU

Re: [Xen-devel] [Intel-gfx] [Announcement] 2015-Q3 release of XenGT - a Mediated Graphics Passthrough Solution from Intel

2015-11-19 Thread Tian, Kevin
> From: Gerd Hoffmann [mailto:kra...@redhat.com] > Sent: Thursday, November 19, 2015 4:41 PM > > Hi, > > > > Another area of extension is how to expose a framebuffer to QEMU for > > > seamless integration into a SPICE/VNC channel. For this I believe we > > > could use a new region, much like w

Re: [Xen-devel] [Intel-gfx] [Announcement] 2015-Q3 release of XenGT - a Mediated Graphics Passthrough Solution from Intel

2015-11-19 Thread Tian, Kevin
> From: Song, Jike > Sent: Friday, November 20, 2015 1:52 PM > > On 11/20/2015 12:22 PM, Alex Williamson wrote: > > On Fri, 2015-11-20 at 10:58 +0800, Jike Song wrote: > >> On 11/19/2015 11:52 PM, Alex Williamson wrote: > >>> On Thu, 2015-11-19 at 15:32 +, Stefano Stabellini wrote: > On T

Re: [Xen-devel] [Intel-gfx] [Announcement] 2015-Q3 release of XenGT - a Mediated Graphics Passthrough Solution from Intel

2015-11-18 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Thursday, November 19, 2015 2:12 AM > > [cc +qemu-devel, +paolo, +gerd] > > On Tue, 2015-10-27 at 17:25 +0800, Jike Song wrote: > > Hi all, > > > > We are pleased to announce another update of Intel GVT-g for Xen. > > > > Intel G

Re: [Xen-devel] Revisit VT-d asynchronous flush issue

2015-11-04 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Tuesday, November 03, 2015 6:04 PM > > >>> On 03.11.15 at 10:58, wrote: > > On 02/11/15 14:10, Jan Beulich wrote: > > On 02.11.15 at 09:03, wrote: > >>> Based on above information, we propose to continue spin-timeout > >>> model w/ some

Re: [Xen-devel] [PATCH v2 2/6] xen/x86: Replace unqualified ud2 instructions with BUG frames

2015-11-02 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Saturday, October 31, 2015 3:59 AM > > No functional change, other than the failure cases, which now produce a > far more clear error message. > > Signed-off-by: Andrew Cooper Acked-by: Kevin Tian __

Re: [Xen-devel] [PATCH 4/6] x86/vmx: Replace unqualified ud2 instructions with BUG frames

2015-11-02 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Saturday, October 31, 2015 3:59 AM > > Using new _ASM_BUGFRAME* internals. > > A side effect of complicating the ASM statements is that GCC now chooses to > out-of-line the stub functions, resulting in identical copies being present

Re: [Xen-devel] Revisit VT-d asynchronous flush issue

2015-11-02 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Monday, November 02, 2015 7:40 PM > > > > > Based on above information, we propose to continue spin-timeout > > model w/ some adjustment, which fixes current timeout concern > > and also allows limited ATS support in a light way: > >

[Xen-devel] Revisit VT-d asynchronous flush issue

2015-11-02 Thread Tian, Kevin
Let's start a new thread with a summary of previous discussion, and then our latest experiment data and updated proposal. >From previous discussions, it's suggested that a spin model is accepted, only when spin timeout doesn't exceed the order of a scheduling time slice, or other blocking opera

Re: [Xen-devel] [PATCH v12 2/3] pci: add wrapper for parse_pci

2015-10-29 Thread Tian, Kevin
> From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com] > Sent: Wednesday, October 28, 2015 4:36 AM > > From: Elena Ufimtseva > > For sbdf's parsing in RMRR command line add __parse_pci with additional > parameter def_seg. __parse_pci will help to identify if segment was > found i

Re: [Xen-devel] [PATCH v12 1/3] iommu VT-d: separate rmrr addition function

2015-10-29 Thread Tian, Kevin
> From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com] > Sent: Wednesday, October 28, 2015 4:36 AM > > From: Elena Ufimtseva > > In preparation for auxiliary RMRR data provided on Xen > command line, make RMRR adding a separate function. > Also free memery for rmrr device scope i

Re: [Xen-devel] [PATCH v12 3/3] iommu: add rmrr Xen command line option for extra rmrrs

2015-10-29 Thread Tian, Kevin
> From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com] > Sent: Wednesday, October 28, 2015 4:36 AM > > From: Elena Ufimtseva > > On some platforms firmware fails to specify RMRR regions in ACPI tables and > thus > those regions will not be mapped in dom0 or guests and may cause

Re: [Xen-devel] [PATCH] x86/vmx: Improvements to vmentry failure handling

2015-10-28 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Saturday, October 24, 2015 1:53 AM > > Combine the almost identical vm_launch_fail() and vm_resume_fail() into > a single vmx_vmentry_failure(). > > Re-save all GPRs so that domain_crash() prints the real register values, > rather t

Re: [Xen-devel] [PATCH] use clear_domain_page() instead of open coding it

2015-10-28 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, October 19, 2015 10:52 PM > > Signed-off-by: Jan Beulich > Acked-by: Kevin Tian ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 3/3] vVMX: use latched VMCS machine address

2015-10-20 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, October 19, 2015 11:23 PM > > Instead of calling domain_page_map_to_mfn() over and over, latch the > guest VMCS machine address unconditionally (i.e. independent of whether > VMCS shadowing is supported by the hardware). > > Since thi

Re: [Xen-devel] [PATCH 2/3] VMX: allocate VMCS pages from domain heap

2015-10-20 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Tuesday, October 20, 2015 6:36 PM > > >>> On 20.10.15 at 12:12, wrote: > > On 19/10/15 16:22, Jan Beulich wrote: > >> -static struct vmcs_struct *vmx_alloc_vmcs(void) > >> +static paddr_t vmx_alloc_vmcs(void) > >> { > >> +struct page_inf

Re: [Xen-devel] [PATCH 1/3] VMX: re-order definitions

2015-10-20 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, October 19, 2015 11:22 PM > To: xen-devel > Cc: Nakajima, Jun; Tian, Kevin > Subject: [PATCH 1/3] VMX: re-order definitions > > ... so they end up reasonably sorted, easing lookup. > > Signed-off-by: Ja

Re: [Xen-devel] [PATCH 04/10] x86/HVM: prefix both instances of enable_intr_window()

2015-10-20 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Tuesday, October 20, 2015 6:41 PM > > ... to tell them apart by their names even without further context. > > Signed-off-by: Jan Beulich > Acked-by: Kevin Tian ___ Xen-devel mailing list Xen-de

Re: [Xen-devel] [PATCH 2/2] x86/vmx: fix coding style of PML functions

2015-10-20 Thread Tian, Kevin
> From: Kai Huang [mailto:kai.hu...@linux.intel.com] > Sent: Tuesday, October 20, 2015 10:35 AM > > According to Jan's comments, also fix the coding style of for_each_vcpu in > existing PML functions. > > Signed-off-by: Kai Huang Acked-by: Kevin Tian __

Re: [Xen-devel] [PATCH 1/2] x86/ept: defer enabling of EPT A/D bit until PML get enabled.

2015-10-20 Thread Tian, Kevin
> From: Kai Huang [mailto:kai.hu...@linux.intel.com] > Sent: Tuesday, October 20, 2015 10:35 AM > > Existing PML implementation turns on EPT A/D bit unconditionally if PML is > supported by hardware. This works but enabling of EPT A/D bit can be deferred > until PML get enabled. There's no point i

Re: [Xen-devel] [PATCH 1/3] x86/p2m: tighten conditions of IOMMU mapping updates

2015-09-28 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, September 21, 2015 10:03 PM > > In the EPT case permission changes should also result in updates or > TLB flushes. > > In the NPT case the old MFN does not depend on the new entry being > valid (but solely on the old one), and the nee

Re: [Xen-devel] [PATCH 3/3] x86/p2m‑ept: adjust some types in ept_set_entry()

2015-09-28 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, September 21, 2015 10:04 PM > > Use unsigned and bool_t as appropriate. > > Signed-off-by: Jan Beulich Acked-by: Kevin Tian ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists

[Xen-devel] [PATCH] MAINTAINERS: Update VT-x maintainers

2015-09-20 Thread Tian, Kevin
MAINTAINERS: Update VT-x maintainers Eddie will not act as a VT-x maintainer anymore. So remove him from the list. Signed-off-by: Kevin Tian CC: Jun Nakajima CC: Eddie Dong diff --git a/MAINTAINERS b/MAINTAINERS index a7fad84..4d0ffcf 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -198,7 +198,

Re: [Xen-devel] [v2][PATCH] vtd/iommu: correct loglevel when check group divices

2015-09-16 Thread Tian, Kevin
> From: Chen, Tiejun > Sent: Wednesday, September 16, 2015 3:39 PM > > Since commit 3848058e7dd6 (vtd/iommu: permit group devices to > passthrough in relaxed mode) is introduced, we always print > message as XENLOG_G_WARNING but its not correct in the case of > strict mode. So here is making this

Re: [Xen-devel] [PATCH 1/4] x86/EPT: always return proper order value from ept_get_entry()

2015-09-16 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Tuesday, September 15, 2015 3:31 PM > > This is so that callers can determine what range of address space would > get altered by a corresponding "set". > > Signed-off-by: Jan Beulich Acked-by: Kevin Tian Thanks Kevin __

Re: [Xen-devel] [PATCH] vtd/iommu: correct loglevel when check group divices

2015-09-16 Thread Tian, Kevin
> From: Chen, Tiejun > Sent: Wednesday, September 16, 2015 9:00 AM > > Since commit 3848058e7dd6 (vtd/iommu: permit group devices to > passthrough in relaxed mode) is introduced, we always print > message as XENLOG_G_WARNING but its not correct in the case of > strict mode. So here is making this

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-14 Thread Tian, Kevin
> From: Chen, Tiejun > Sent: Monday, September 14, 2015 2:25 PM > > > OK, that explanation is fine to me as long as it's made clear no > > security guarantee once admin uses 'relax' for any domain. Tiejun > > could you resend patch with right warning/error type? > > > > Sure, but a little bit mak

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-14 Thread Tian, Kevin
> From: Chen, Tiejun > Sent: Wednesday, September 09, 2015 10:00 AM > > Currently we don't allow passing through any group devices which are > sharing same RMRR entry since it would break security among VMs. And > indeed, we expect we can figure out a better way to handle this kind > of case compl

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-11 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Friday, September 11, 2015 4:56 PM > > >>> On 11.09.15 at 01:22, wrote: > > Sorry it's a bad example. My actual concern is that we can't count > > on this per-VM relax/strict policy to prevent group devices assigned > > to different VM. In th

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-10 Thread Tian, Kevin
> From: Chen, Tiejun > Sent: Friday, September 11, 2015 10:21 AM > > >> >> > > However I don't think this patch is a right fix. So far > >> >> > > relax/strict policy > >> >> > > is per-domain. what about one VM specifies relax while another VM > >> >> > > specifies strict when each is assigned w

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-10 Thread Tian, Kevin
> From: Chen, Tiejun > Sent: Friday, September 11, 2015 8:56 AM > > >> > > Need to have separate warning/error level for relax/strict. > >> > > > >> > > However I don't think this patch is a right fix. So far relax/strict > >> > > policy > >> > > is per-domain. what about one VM specifies relax w

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-10 Thread Tian, Kevin
> From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: Thursday, September 10, 2015 6:37 PM > > On Thu, Sep 10, 2015 at 02:09:39AM -0600, Jan Beulich wrote: > > >>> On 10.09.15 at 07:23, wrote: > > >> From: Jan Beulich [mailto:jbeul...@suse.com] > > >> Sent: Wednesday, September 09, 2015 2:55 PM >

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-09 Thread Tian, Kevin
> From: Chen, Tiejun > Sent: Thursday, September 10, 2015 1:47 PM > > > Need to have separate warning/error level for relax/strict. > > > > However I don't think this patch is a right fix. So far relax/strict policy > > is per-domain. what about one VM specifies relax while another VM > > specifie

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-09 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Wednesday, September 09, 2015 2:55 PM > > >>> On 09.09.15 at 03:59, wrote: > > @@ -2310,12 +2312,16 @@ static int intel_iommu_assign_device( > > PCI_DEVFN2(bdf) == devfn && > > rmrr->scope.devices_cnt > 1 ) > >

Re: [Xen-devel] [BUG] 'o' debug key panics the hypervisor

2015-08-27 Thread Tian, Kevin
> From: Roger Pau Monné [mailto:roger@citrix.com] > Sent: Thursday, August 27, 2015 10:08 PM > > El 27/08/15 a les 16.01, Jan Beulich ha escrit: > On 27.08.15 at 13:29, wrote: > >> When using Intel hardware without shared page tables between the IOMMU > >> and EPT (I have not tried if th

Re: [Xen-devel] [PATCH for 4.6] VT-d: Create IOMMU mappings for RMRR regions if shared EPT is not being used

2015-08-27 Thread Tian, Kevin
> From: Chen, Tiejun > Sent: Thursday, August 27, 2015 5:05 PM > > On 8/27/2015 4:40 PM, Malcolm Crossley wrote: > > On 27/08/15 03:59, Chen, Tiejun wrote: > >> This kind of issue is already gone. > >> > >> https://www.mail-archive.com/xen-devel@lists.xen.org/msg32464.html > > > > There is a bug i

Re: [Xen-devel] [PATCH] x86/vmx: fix vmx_is_singlestep_supported return value

2015-08-27 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Tuesday, August 25, 2015 3:59 PM > > >>> Tamas K Lengyel 08/25/15 1:51 AM >>> > >>> @@ -1768,7 +1768,7 @@ static void vmx_enable_msr_exit_interception(struct > domain *d) > >>> > >>> static bool_t vmx_is_singlestep_supported(void) > >>> { >

Re: [Xen-devel] [PATCH] x86/vmx: fix vmx_is_singlestep_supported return value

2015-08-27 Thread Tian, Kevin
> From: Tamas K Lengyel [mailto:ta...@tklengyel.com] > Sent: Tuesday, August 25, 2015 3:56 AM > > The function supposed to return a boolean but instead it returned > the value 0x800 which is the Intel internal flag for MTF. This has > caused various checks using this function to falsely report

Re: [Xen-devel] [PATCH v7 2/3] Differentiate IO/mem resources tracked by ioreq server

2015-08-20 Thread Tian, Kevin
> From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com] > Sent: Friday, August 21, 2015 11:31 AM > > Currently in ioreq server, guest write-protected ram pages are > tracked in the same rangeset with device mmio resources. Yet > unlike device mmio, which can be in big chunks, the guest write- > prote

Re: [Xen-devel] [PATCH v2 1/2] x86/HVM: hvm_map_guest_frame_rw() adjustments

2015-08-14 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Wednesday, August 12, 2015 10:17 PM > > ... and its callers. > > While all non-nested users are made fully honor the semantics of that > type, doing so in the nested case seemed insane (if doable at all, > considering VMCS shadowing), and hen

Re: [Xen-devel] [PATCH] x86/p2m: clear_identity_p2m_entry() must cope with 'relaxed' RDM mode

2015-08-14 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Wednesday, August 12, 2015 11:06 PM > > Tearing down a 1:1 mapping that was never established isn't really nice > (and in fact hits an ASSERT() in p2m_remove_page()). Convert from a > wrapper macro to a proper function which then can take care

Re: [Xen-devel] [PATCH v4] VT-d: add iommu=igfx option to workaround graphics issues

2015-08-05 Thread Tian, Kevin
> From: Ting-Wei Lan [mailto:lant...@gmail.com] > Sent: Thursday, August 06, 2015 1:10 AM > > When using Linux >= 3.19 (commit 47591df) as dom0 on some Intel Ironlake > devices, It is possible to encounter graphics issues that make screen > unreadable or crash the system. It was reported in freede

Re: [Xen-devel] [PATCH v2] VT-d: add iommu=igfx option to workaround graphics issues

2015-08-03 Thread Tian, Kevin
> From: Ting-Wei Lan [mailto:lant...@gmail.com] > Sent: Friday, July 31, 2015 4:38 PM > > Tian, Kevin 於 西元2015年07月31日 09:26 寫道: > >> From: Ting-Wei Lan [mailto:lant...@gmail.com] > >> Sent: Sunday, July 26, 2015 12:58 AM > >> > >> When using Linu

Re: [Xen-devel] [PATCH] x86/HVM: honor p2m_ram_ro in hvm_map_guest_frame_rw()

2015-07-30 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Friday, July 24, 2015 5:41 PM > > ... and its callers. > > While all non-nested users are made fully honor the semantics of that > type, doing so in the nested case seemed insane (if doable at all, > considering VMCS shadowing), and hence the

Re: [Xen-devel] [PATCH v2] VT-d: add iommu=igfx option to workaround graphics issues

2015-07-30 Thread Tian, Kevin
> From: Ting-Wei Lan [mailto:lant...@gmail.com] > Sent: Sunday, July 26, 2015 12:58 AM > > When using Linux >= 3.19 (commit 47591df) as dom0 on some Intel Ironlake > devices, It is possible to encounter graphics issues that make screen > unreadable or crash the system. It was reported in freedeskt

Re: [Xen-devel] [PATCH] VT-d: add iommu=igfx_off option to workaround graphics issues

2015-07-21 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Tuesday, July 21, 2015 3:17 PM > >>> On 21.07.15 at 09:05, wrote: > >> From: Jan Beulich [mailto:jbeul...@suse.com] > >> Sent: Tuesday, July 21, 2015 2:57 PM > >> >>> On 21.07.15 at 02:57, wrote: > >> >> From: Andrew Cooper [mailto:am...@

Re: [Xen-devel] [PATCH] VT-d: add iommu=igfx_off option to workaround graphics issues

2015-07-21 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Tuesday, July 21, 2015 2:57 PM > > >>> On 21.07.15 at 02:57, wrote: > >> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew > > Cooper > >> Sent: Monday, July 20, 2015 4:21

Re: [Xen-devel] [PATCH] VT-d: add iommu=igfx_off option to workaround graphics issues

2015-07-20 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, July 20, 2015 8:24 PM > > >>> On 20.07.15 at 14:12, wrote: > > On 17/07/15 20:05, Ting-Wei Lan wrote: > >> When using Linux >= 3.19 (commit 47591df) as dom0 on some Intel Ironlake > >> devices, It is possible to encounter graphics iss

Re: [Xen-devel] [PATCH] VT-d: add iommu=igfx_off option to workaround graphics issues

2015-07-20 Thread Tian, Kevin
> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew Cooper > Sent: Monday, July 20, 2015 4:21 PM > > On 20/07/2015 02:28, Tian, Kevin wrote: > >> From: Ting-Wei Lan [mailto:lant...@gmail.com] > >> Sent: Saturday, July 18, 2015 3:06 AM >

Re: [Xen-devel] [PATCH] dmar: Fix double free in error paths following c/s a8bc99b

2015-07-19 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Thursday, July 16, 2015 7:57 PM > > Several error paths would end up freeing scope->devices twice. > > Signed-off-by: Andrew Cooper > CC: Jan Beulich > CC: Elena Ufimtseva > CC: Yang Zhang > CC: Kevin Tian Acked-by: Kevin Tian

Re: [Xen-devel] [PATCH] VT-d: add iommu=igfx_off option to workaround graphics issues

2015-07-19 Thread Tian, Kevin
> From: Ting-Wei Lan [mailto:lant...@gmail.com] > Sent: Saturday, July 18, 2015 3:06 AM > > When using Linux >= 3.19 (commit 47591df) as dom0 on some Intel Ironlake > devices, It is possible to encounter graphics issues that make screen > unreadable or crash the system. It was reported in freedesk

Re: [Xen-devel] Requesting for freeze exception for RMRR

2015-07-19 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Friday, July 17, 2015 11:11 PM > > On 17/07/15 15:01, Wei Liu wrote: > > On Fri, Jul 17, 2015 at 02:43:05PM +0100, Jan Beulich wrote: > > On 17.07.15 at 15:21, wrote: > >>> The major concern seems to be around the PCI allocation

Re: [Xen-devel] [v9][PATCH 03/16] xen/passthrough: extend hypercall to support rdm reservation policy

2015-07-19 Thread Tian, Kevin
> From: Chen, Tiejun > Sent: Friday, July 17, 2015 8:45 AM > > This patch extends the existing hypercall to support rdm reservation policy. > We return error or just throw out a warning message depending on whether > the policy is "strict" or "relaxed" when reserving RDM regions in pfn space. > No

Re: [Xen-devel] [PATCH v25 13/15] x86/VPMU: Merge vpmu_rdmsr and vpmu_wrmsr

2015-07-08 Thread Tian, Kevin
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] > Sent: Saturday, June 20, 2015 2:45 AM > > The two routines share most of their logic. > > Signed-off-by: Boris Ostrovsky > Reviewed-by: Dietmar Hahn Reviewed-by: Kevin Tian > --- > xen/arch/x86/hvm/vpmu.c| 75 > ++

Re: [Xen-devel] [PATCH v25 14/15] x86/VPMU: Add privileged PMU mode

2015-07-08 Thread Tian, Kevin
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] > Sent: Saturday, June 20, 2015 2:45 AM > > Add support for privileged PMU mode (XENPMU_MODE_ALL) which allows privileged > domain (dom0) profile both itself (and the hypervisor) and the guests. While > this mode is on profiling in guests

Re: [Xen-devel] [PATCH v25 05/15] x86/VPMU: Initialize VPMUs with __initcall

2015-07-08 Thread Tian, Kevin
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] > Sent: Saturday, June 20, 2015 2:45 AM > > Move some VPMU initilization operations into __initcalls to avoid performing > same tests and calculations for each vcpu. > > Signed-off-by: Boris Ostrovsky > Acked-by: Jan Beulich Acked-by:

Re: [Xen-devel] [PATCH v25 04/15] x86/VPMU: Interface for setting PMU mode and flags

2015-07-08 Thread Tian, Kevin
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] > Sent: Saturday, June 20, 2015 2:45 AM > > Add runtime interface for setting PMU mode and flags. Three main modes are > provided: > * XENPMU_MODE_OFF: PMU is not virtualized > * XENPMU_MODE_SELF: Guests can access PMU MSRs and receive P

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-08 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Wednesday, July 08, 2015 9:09 PM > > On 08/07/2015 13:46, Jan Beulich wrote: > On 08.07.15 at 13:00, wrote: > >>> @@ -1848,6 +1869,33 @@ static struct hvm_function_table __initdata > >>> vmx_function_table = { > >>> .enabl

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-08 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Wednesday, July 08, 2015 8:46 PM > > >>> On 08.07.15 at 13:00, wrote: > >> @@ -1848,6 +1869,33 @@ static struct hvm_function_table __initdata > >> vmx_function_table = { > >> .enable_msr_exit_interception = vmx_enable_msr_exit_intercepti

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, July 08, 2015 7:52 PM > > > > > + * - For lowest-priority interrupts, we find the destination vCPU > > > > > from the > > > > > + * guest vector using vector-hashing mechanism and return true. > > > > > This > > > > follows > > > > > + * the hardware behavi

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, July 08, 2015 7:05 PM > > > > -Original Message- > > From: Wu, Feng > > Sent: Wednesday, July 08, 2015 6:32 PM > > To: Tian, Kevin; xen-devel@lists.xen.org > > Cc: k...@xen.org; jbeul...@suse.com; an

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, July 08, 2015 6:32 PM > > > > > -Original Message- > > From: Tian, Kevin > > Sent: Wednesday, July 08, 2015 6:23 PM > > To: Wu, Feng; xen-devel@lists.xen.org > > Cc: k...@xen.org; jbeul...@suse.com;

Re: [Xen-devel] [v3 08/15] Suppress posting interrupts when 'SN' is set

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, July 08, 2015 6:11 PM > > From: Tian, Kevin > > Sent: Wednesday, July 08, 2015 5:06 PM > > > > > From: Wu, Feng > > > Sent: Wednesday, June 24, 2015 1:18 PM > > > > > > Currently, we don't sup

Re: [Xen-devel] [v3 15/15] Add a command line parameter for VT-d posted-interrupts

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > Enable VT-d Posted-Interrupts and add a command line > parameter for it. > > Signed-off-by: Feng Wu > --- > v3: > Remove the redundant "no intremp then no intpost" logic > > docs/misc/xen-command-line.markdown | 9 - > xen/d

Re: [Xen-devel] [v3 14/15] Update Posted-Interrupts Descriptor during vCPU scheduling

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > The basic idea here is: > 1. When vCPU's state is RUNSTATE_running, > - set 'NV' to 'Notification Vector'. > - Clear 'SN' to accpet PI. > - set 'NDST' to the right pCPU. > 2. When vCPU's state is RUNSTATE_blocked

Re: [Xen-devel] [v3 13/15] vmx: Properly handle notification event when vCPU is running

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > When a vCPU is running in Root mode and a notification event > has been injected to it. we need to set VCPU_KICK_SOFTIRQ for > the current cpu, so the pending interrupt in PIRR will be > synced to vIRR before VM-Exit in time. > > Signe

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > This patch includes the following aspects: > - Add a global vector to wake up the blocked vCPU > when an interrupt is being posted to it (This > part was sugguested by Yang Zhang ). > - Adds a new per-vCPU tasklet to wakeup the bloc

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Wednesday, June 24, 2015 1:18 PM > > When guest changes its interrupt configuration (such as, vector, etc.) > for direct-assigned devices, we need to update the associated IRTE > with the new guest vector, so external interrupts from the assigned > devices can be injected

<    2   3   4   5   6   7   8   9   10   >