> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Wednesday, December 02, 2015 12:50 AM
>
> We only support family 6 so quirk handling is always needed.
what about you adding other family support in the future then you'll
add back below quirk check?
>
> Signed-off-by: Boris Os
> From: Dietmar Hahn [mailto:dietmar.h...@ts.fujitsu.com]
> Sent: Wednesday, December 02, 2015 5:21 PM
>
> Am Mittwoch 02 Dezember 2015, 02:20:49 schrieb Tian, Kevin:
> > > From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> > > Sent: Wednesd
> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> Sent: Wednesday, December 02, 2015 9:51 PM
> >
> > According to
> > http://osstest.test-lab.xenproject.org/~osstest/pub/results/bisect/xen-un
> > stable/test-amd64-amd64-qemuu-nested-intel.debian-hvm-install--l1
> > --l2.html
> > it was unable
> From: Tian, Kevin
> Sent: Thursday, December 03, 2015 9:20 AM
>
> > From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> > Sent: Thursday, November 26, 2015 9:56 PM
> >
> > On 26/11/15 13:48, Malcolm Crossley wrote:
> > > On 26/11/15 13:46, Jan Beu
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Thursday, November 26, 2015 9:56 PM
>
> On 26/11/15 13:48, Malcolm Crossley wrote:
> > On 26/11/15 13:46, Jan Beulich wrote:
> > On 25.11.15 at 11:28, wrote:
> >>> The problem is that SandyBridge IOMMUs advertise 2M support and
> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: Saturday, November 14, 2015 2:50 AM
>
> If a page is freed without translations being invalidated, and the page is
> subsequently allocated to another domain, a guest with a cached
> translation will still be able to access the page.
>
> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: Saturday, November 14, 2015 2:50 AM
>
> When using EPT, type changes are done with the following steps:
>
> 1. Set entry as invalid (misconfigured) by settings a reserved memory
> type.
>
> 2. Flush all EPT and combined translations (
> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: Saturday, November 14, 2015 2:50 AM
>
> This RFC series improves the performance of EPT by reducing the impact
> of the translation invalidations (ept_sync_domain()). Two approaches
> are used:
>
> a) Removing unnecessary invalidation
> From: Kai Huang [mailto:kai.hu...@linux.intel.com]
> Sent: Friday, November 27, 2015 4:52 PM
>
> Since PML series were merged (but disabled by default) we have conducted lots
> of
> PML tests (live migration, GUI display) and PML has been working fine,
> therefore
> turn it on by default.
>
>
Eric, could you provide your motherboard information and as Andrew pointed out
what’s f0:1f.0?
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: Sunday, November 29, 2015 6:15 AM
To: Eric Shelton; xen-devel; Zhang, Yang Z; Tian, Kevin; Keir Fraser; Jan
Beulich
Subject: Re: Skylake
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Friday, November 27, 2015 7:02 PM
>
> VMX doesn't need a software CPL check on the XSETBV intercept, and
> SVM can do that check without resorting to hvm_get_segment_register().
>
> Clean up what is left of hvm_handle_xsetbv(), namely make it
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Wednesday, December 02, 2015 12:50 AM
>
> * Limit VPMU support to PMU versions 2, 3 and 4 (emulated at version 3 level)
> * Always implement family 6 VPMU quirk.
> ==> Intel folks: is the quirk needed for all family 6 processor
> From: Malcolm Crossley [mailto:malcolm.cross...@citrix.com]
> Sent: Wednesday, November 25, 2015 11:59 PM
>
> On 25/11/15 15:38, Jan Beulich wrote:
> On 25.11.15 at 16:13, wrote:
> >> On 25/11/15 10:49, Jan Beulich wrote:
> >> On 25.11.15 at 11:28, wrote:
> On 24/11/15 17:41, Jan
> From: Roger Pau Monne [mailto:roger@citrix.com]
> Sent: Saturday, November 07, 2015 12:06 AM
>
> Signed-off-by: Roger Pau Monné
> Reviewed-by: Andrew Cooper
> Acked-by: Jan Beulich
> Cc: Jan Beulich
> Cc: Andrew Cooper
> Cc: Jun Nakajima
> Cc: Eddie Dong
> Cc: Kevin Tian
Acked-by: K
> From: Roger Pau Monne [mailto:roger@citrix.com]
> Sent: Saturday, November 07, 2015 12:06 AM
>
> The HVM related code (SVM, VMX) generally assumed that a local apic is
> always present. With the introduction of a HVM mode were the local apic can
> be removed, some of this broken code paths a
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Tuesday, November 24, 2015 4:52 PM
>
> >>> On 24.11.15 at 08:56, wrote:
> >> From: Wu, Feng
> >> Sent: Tuesday, November 24, 2015 3:54 PM
> >> > From: Tian, Kevin
> >> > Sent: T
> From: Wu, Feng
> Sent: Tuesday, November 24, 2015 3:54 PM
>
>
> > -Original Message-----
> > From: Tian, Kevin
> > Sent: Tuesday, November 24, 2015 3:45 PM
> > To: Wu, Feng ; xen-devel@lists.xen.org
> > Cc: Zhang, Yang Z ; Keir Fraser ; Jan
&g
> From: Wu, Feng
> Sent: Tuesday, November 24, 2015 3:47 PM
>
>
> > -Original Message-----
> > From: Tian, Kevin
> > Sent: Tuesday, November 24, 2015 3:30 PM
> > To: Wu, Feng ; xen-devel@lists.xen.org
> > Cc: Keir Fraser ; Jan Beulich ; Andrew
&g
> From: Wu, Feng
> Sent: Tuesday, November 03, 2015 4:43 PM
>
> Add the utility to dump the posted format IRTE.
>
> CC: Yang Zhang
> CC: Kevin Tian
> Signed-off-by: Feng Wu
Acked-by: Kevin Tian
___
Xen-devel mailing list
Xen-devel@lists.xen.org
ht
> From: Wu, Feng
> Sent: Tuesday, November 03, 2015 4:43 PM
>
> This patch adds an API which is used to update the IRTE
> for posted-interrupt when guest changes MSI/MSI-X information.
>
> CC: Yang Zhang
> CC: Kevin Tian
> CC: Keir Fraser
> CC: Jan Beulich
> CC: Andrew Cooper
> Signed-off-by
> From: Wu, Feng
> Sent: Tuesday, November 03, 2015 4:43 PM
>
> Remove pointless casts.
>
> CC: Yang Zhang
> CC: Kevin Tian
> Suggested-by: Jan Beulich
> Signed-off-by: Feng Wu
> Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Kevin Tian
___
Xen-de
> From: Wu, Feng
> Sent: Tuesday, November 03, 2015 4:43 PM
N' is set
>
> Currently, we don't support urgent interrupt, all interrupts
> are recognized as non-urgent interrupt, so we cannot send
> posted-interrupt when 'SN' is set.
>
> CC: Kevin Tian
> CC: Keir Fraser
> CC: Jan Beulich
> CC: A
> From: Wu, Feng
> Sent: Tuesday, November 03, 2015 4:43 PM
>
> This patch adds some helper functions to manipulate the
> Posted-Interrupts Descriptor.
>
> CC: Kevin Tian
> CC: Keir Fraser
> CC: Jan Beulich
> CC: Andrew Cooper
> Signed-off-by: Feng Wu
> Reviewed-by: Konrad Rzeszutek Wilk
A
> From: Wu, Feng
> Sent: Tuesday, November 03, 2015 4:43 PM
>
> VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt.
> With VT-d Posted-Interrupts enabled, external interrupts from
> direct-assigned devices can be delivered to guests without VMM
> intervention when guest is runni
> From: Wu, Feng
> Sent: Tuesday, November 03, 2015 4:43 PM
>
>
> diff --git a/docs/misc/vtd-pi.txt b/docs/misc/vtd-pi.txt
> new file mode 100644
> index 000..f9b4637
> --- /dev/null
> +++ b/docs/misc/vtd-pi.txt
> @@ -0,0 +1,329 @@
> +Authors: Feng Wu
> +
> +VT-d Posted-interrupt (PI) design
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Tuesday, November 10, 2015 10:52 PM
> >
> > +Here are what we do for the blocked vCPU:
> > +1. Define a per-cpu list 'pi_blocked_vcpu', which stored the blocked
> > +vCPU on the pCPU.
> > +2. When the vCPU is going to block, insert t
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, November 23, 2015 10:28 PM
>
> >>> On 21.10.15 at 05:16, wrote:
> >> From: Jan Beulich [mailto:jbeul...@suse.com]
> >> Sent: Tuesday, October 20, 2015 6:36 PM
> >> >>> On 20.10.15 at 12:12, wrote:
> >> > On 19/10/15 16:22, Jan Beuli
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, November 23, 2015 8:49 PM
>
> In the course of investigating the 4.1.6 backport issue of the XSA-156
> patch I realized that #DB injection has always been broken, but with it
> now getting always intercepted the problem has got worse:
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, November 23, 2015 9:51 PM
>
> - constify struct hvm_trap * function parameters
> - width reduce and shuffle some struct hvm_trap members
> - use bool_t for boolean fields struct hvm_function_table
> - use unsigned for struct hvm_functi
> From: Zhang, Yang Z
> Sent: Monday, November 23, 2015 1:35 PM
>
> add Feng as the new maintainer of VT-d stuff
>
> Signed-off-by: Yang Zhang
Acked-by: Kevin Tian
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
> From: Gerd Hoffmann [mailto:kra...@redhat.com]
> Sent: Friday, November 20, 2015 4:26 PM
>
> Hi,
>
> > > iGVT-g_Setup_Guide.txt mentions a "Indirect Display Mode", but doesn't
> > > explain how the guest framebuffer can be accessed then.
> >
> > You can check "fb_decoder.h". One thing to clar
> From: Tian, Kevin
> Sent: Friday, November 20, 2015 3:10 PM
> > > >
> > > > The proposal is therefore that GPU vendors can expose vGPUs to
> > > > userspace, and thus to QEMU, using the VFIO API. For instance, vfio
> > > > supports modul
> From: Alex Williamson [mailto:alex.william...@redhat.com]
> Sent: Friday, November 20, 2015 4:03 AM
>
> > >
> > > The proposal is therefore that GPU vendors can expose vGPUs to
> > > userspace, and thus to QEMU, using the VFIO API. For instance, vfio
> > > supports modular bus drivers and IOMMU
> From: Gerd Hoffmann [mailto:kra...@redhat.com]
> Sent: Thursday, November 19, 2015 4:41 PM
>
> Hi,
>
> > > Another area of extension is how to expose a framebuffer to QEMU for
> > > seamless integration into a SPICE/VNC channel. For this I believe we
> > > could use a new region, much like w
> From: Song, Jike
> Sent: Friday, November 20, 2015 1:52 PM
>
> On 11/20/2015 12:22 PM, Alex Williamson wrote:
> > On Fri, 2015-11-20 at 10:58 +0800, Jike Song wrote:
> >> On 11/19/2015 11:52 PM, Alex Williamson wrote:
> >>> On Thu, 2015-11-19 at 15:32 +, Stefano Stabellini wrote:
> On T
> From: Alex Williamson [mailto:alex.william...@redhat.com]
> Sent: Thursday, November 19, 2015 2:12 AM
>
> [cc +qemu-devel, +paolo, +gerd]
>
> On Tue, 2015-10-27 at 17:25 +0800, Jike Song wrote:
> > Hi all,
> >
> > We are pleased to announce another update of Intel GVT-g for Xen.
> >
> > Intel G
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Tuesday, November 03, 2015 6:04 PM
>
> >>> On 03.11.15 at 10:58, wrote:
> > On 02/11/15 14:10, Jan Beulich wrote:
> > On 02.11.15 at 09:03, wrote:
> >>> Based on above information, we propose to continue spin-timeout
> >>> model w/ some
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Saturday, October 31, 2015 3:59 AM
>
> No functional change, other than the failure cases, which now produce a
> far more clear error message.
>
> Signed-off-by: Andrew Cooper
Acked-by: Kevin Tian
__
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Saturday, October 31, 2015 3:59 AM
>
> Using new _ASM_BUGFRAME* internals.
>
> A side effect of complicating the ASM statements is that GCC now chooses to
> out-of-line the stub functions, resulting in identical copies being present
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Monday, November 02, 2015 7:40 PM
>
> >
> > Based on above information, we propose to continue spin-timeout
> > model w/ some adjustment, which fixes current timeout concern
> > and also allows limited ATS support in a light way:
> >
Let's start a new thread with a summary of previous discussion, and
then our latest experiment data and updated proposal.
>From previous discussions, it's suggested that a spin model is accepted,
only when spin timeout doesn't exceed the order of a scheduling time
slice, or other blocking opera
> From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
> Sent: Wednesday, October 28, 2015 4:36 AM
>
> From: Elena Ufimtseva
>
> For sbdf's parsing in RMRR command line add __parse_pci with additional
> parameter def_seg. __parse_pci will help to identify if segment was
> found i
> From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
> Sent: Wednesday, October 28, 2015 4:36 AM
>
> From: Elena Ufimtseva
>
> In preparation for auxiliary RMRR data provided on Xen
> command line, make RMRR adding a separate function.
> Also free memery for rmrr device scope i
> From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
> Sent: Wednesday, October 28, 2015 4:36 AM
>
> From: Elena Ufimtseva
>
> On some platforms firmware fails to specify RMRR regions in ACPI tables and
> thus
> those regions will not be mapped in dom0 or guests and may cause
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Saturday, October 24, 2015 1:53 AM
>
> Combine the almost identical vm_launch_fail() and vm_resume_fail() into
> a single vmx_vmentry_failure().
>
> Re-save all GPRs so that domain_crash() prints the real register values,
> rather t
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, October 19, 2015 10:52 PM
>
> Signed-off-by: Jan Beulich
>
Acked-by: Kevin Tian
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, October 19, 2015 11:23 PM
>
> Instead of calling domain_page_map_to_mfn() over and over, latch the
> guest VMCS machine address unconditionally (i.e. independent of whether
> VMCS shadowing is supported by the hardware).
>
> Since thi
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Tuesday, October 20, 2015 6:36 PM
>
> >>> On 20.10.15 at 12:12, wrote:
> > On 19/10/15 16:22, Jan Beulich wrote:
> >> -static struct vmcs_struct *vmx_alloc_vmcs(void)
> >> +static paddr_t vmx_alloc_vmcs(void)
> >> {
> >> +struct page_inf
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, October 19, 2015 11:22 PM
> To: xen-devel
> Cc: Nakajima, Jun; Tian, Kevin
> Subject: [PATCH 1/3] VMX: re-order definitions
>
> ... so they end up reasonably sorted, easing lookup.
>
> Signed-off-by: Ja
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Tuesday, October 20, 2015 6:41 PM
>
> ... to tell them apart by their names even without further context.
>
> Signed-off-by: Jan Beulich
>
Acked-by: Kevin Tian
___
Xen-devel mailing list
Xen-de
> From: Kai Huang [mailto:kai.hu...@linux.intel.com]
> Sent: Tuesday, October 20, 2015 10:35 AM
>
> According to Jan's comments, also fix the coding style of for_each_vcpu in
> existing PML functions.
>
> Signed-off-by: Kai Huang
Acked-by: Kevin Tian
__
> From: Kai Huang [mailto:kai.hu...@linux.intel.com]
> Sent: Tuesday, October 20, 2015 10:35 AM
>
> Existing PML implementation turns on EPT A/D bit unconditionally if PML is
> supported by hardware. This works but enabling of EPT A/D bit can be deferred
> until PML get enabled. There's no point i
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, September 21, 2015 10:03 PM
>
> In the EPT case permission changes should also result in updates or
> TLB flushes.
>
> In the NPT case the old MFN does not depend on the new entry being
> valid (but solely on the old one), and the nee
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, September 21, 2015 10:04 PM
>
> Use unsigned and bool_t as appropriate.
>
> Signed-off-by: Jan Beulich
Acked-by: Kevin Tian
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists
MAINTAINERS: Update VT-x maintainers
Eddie will not act as a VT-x maintainer anymore. So remove
him from the list.
Signed-off-by: Kevin Tian
CC: Jun Nakajima
CC: Eddie Dong
diff --git a/MAINTAINERS b/MAINTAINERS
index a7fad84..4d0ffcf 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -198,7 +198,
> From: Chen, Tiejun
> Sent: Wednesday, September 16, 2015 3:39 PM
>
> Since commit 3848058e7dd6 (vtd/iommu: permit group devices to
> passthrough in relaxed mode) is introduced, we always print
> message as XENLOG_G_WARNING but its not correct in the case of
> strict mode. So here is making this
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Tuesday, September 15, 2015 3:31 PM
>
> This is so that callers can determine what range of address space would
> get altered by a corresponding "set".
>
> Signed-off-by: Jan Beulich
Acked-by: Kevin Tian
Thanks
Kevin
__
> From: Chen, Tiejun
> Sent: Wednesday, September 16, 2015 9:00 AM
>
> Since commit 3848058e7dd6 (vtd/iommu: permit group devices to
> passthrough in relaxed mode) is introduced, we always print
> message as XENLOG_G_WARNING but its not correct in the case of
> strict mode. So here is making this
> From: Chen, Tiejun
> Sent: Monday, September 14, 2015 2:25 PM
>
> > OK, that explanation is fine to me as long as it's made clear no
> > security guarantee once admin uses 'relax' for any domain. Tiejun
> > could you resend patch with right warning/error type?
> >
>
> Sure, but a little bit mak
> From: Chen, Tiejun
> Sent: Wednesday, September 09, 2015 10:00 AM
>
> Currently we don't allow passing through any group devices which are
> sharing same RMRR entry since it would break security among VMs. And
> indeed, we expect we can figure out a better way to handle this kind
> of case compl
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Friday, September 11, 2015 4:56 PM
>
> >>> On 11.09.15 at 01:22, wrote:
> > Sorry it's a bad example. My actual concern is that we can't count
> > on this per-VM relax/strict policy to prevent group devices assigned
> > to different VM. In th
> From: Chen, Tiejun
> Sent: Friday, September 11, 2015 10:21 AM
>
> >> >> > > However I don't think this patch is a right fix. So far
> >> >> > > relax/strict policy
> >> >> > > is per-domain. what about one VM specifies relax while another VM
> >> >> > > specifies strict when each is assigned w
> From: Chen, Tiejun
> Sent: Friday, September 11, 2015 8:56 AM
>
> >> > > Need to have separate warning/error level for relax/strict.
> >> > >
> >> > > However I don't think this patch is a right fix. So far relax/strict
> >> > > policy
> >> > > is per-domain. what about one VM specifies relax w
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: Thursday, September 10, 2015 6:37 PM
>
> On Thu, Sep 10, 2015 at 02:09:39AM -0600, Jan Beulich wrote:
> > >>> On 10.09.15 at 07:23, wrote:
> > >> From: Jan Beulich [mailto:jbeul...@suse.com]
> > >> Sent: Wednesday, September 09, 2015 2:55 PM
>
> From: Chen, Tiejun
> Sent: Thursday, September 10, 2015 1:47 PM
>
> > Need to have separate warning/error level for relax/strict.
> >
> > However I don't think this patch is a right fix. So far relax/strict policy
> > is per-domain. what about one VM specifies relax while another VM
> > specifie
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, September 09, 2015 2:55 PM
>
> >>> On 09.09.15 at 03:59, wrote:
> > @@ -2310,12 +2312,16 @@ static int intel_iommu_assign_device(
> > PCI_DEVFN2(bdf) == devfn &&
> > rmrr->scope.devices_cnt > 1 )
> >
> From: Roger Pau Monné [mailto:roger@citrix.com]
> Sent: Thursday, August 27, 2015 10:08 PM
>
> El 27/08/15 a les 16.01, Jan Beulich ha escrit:
> On 27.08.15 at 13:29, wrote:
> >> When using Intel hardware without shared page tables between the IOMMU
> >> and EPT (I have not tried if th
> From: Chen, Tiejun
> Sent: Thursday, August 27, 2015 5:05 PM
>
> On 8/27/2015 4:40 PM, Malcolm Crossley wrote:
> > On 27/08/15 03:59, Chen, Tiejun wrote:
> >> This kind of issue is already gone.
> >>
> >> https://www.mail-archive.com/xen-devel@lists.xen.org/msg32464.html
> >
> > There is a bug i
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Tuesday, August 25, 2015 3:59 PM
>
> >>> Tamas K Lengyel 08/25/15 1:51 AM >>>
> >>> @@ -1768,7 +1768,7 @@ static void vmx_enable_msr_exit_interception(struct
> domain *d)
> >>>
> >>> static bool_t vmx_is_singlestep_supported(void)
> >>> {
>
> From: Tamas K Lengyel [mailto:ta...@tklengyel.com]
> Sent: Tuesday, August 25, 2015 3:56 AM
>
> The function supposed to return a boolean but instead it returned
> the value 0x800 which is the Intel internal flag for MTF. This has
> caused various checks using this function to falsely report
> From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com]
> Sent: Friday, August 21, 2015 11:31 AM
>
> Currently in ioreq server, guest write-protected ram pages are
> tracked in the same rangeset with device mmio resources. Yet
> unlike device mmio, which can be in big chunks, the guest write-
> prote
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, August 12, 2015 10:17 PM
>
> ... and its callers.
>
> While all non-nested users are made fully honor the semantics of that
> type, doing so in the nested case seemed insane (if doable at all,
> considering VMCS shadowing), and hen
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, August 12, 2015 11:06 PM
>
> Tearing down a 1:1 mapping that was never established isn't really nice
> (and in fact hits an ASSERT() in p2m_remove_page()). Convert from a
> wrapper macro to a proper function which then can take care
> From: Ting-Wei Lan [mailto:lant...@gmail.com]
> Sent: Thursday, August 06, 2015 1:10 AM
>
> When using Linux >= 3.19 (commit 47591df) as dom0 on some Intel Ironlake
> devices, It is possible to encounter graphics issues that make screen
> unreadable or crash the system. It was reported in freede
> From: Ting-Wei Lan [mailto:lant...@gmail.com]
> Sent: Friday, July 31, 2015 4:38 PM
>
> Tian, Kevin 於 西元2015年07月31日 09:26 寫道:
> >> From: Ting-Wei Lan [mailto:lant...@gmail.com]
> >> Sent: Sunday, July 26, 2015 12:58 AM
> >>
> >> When using Linu
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Friday, July 24, 2015 5:41 PM
>
> ... and its callers.
>
> While all non-nested users are made fully honor the semantics of that
> type, doing so in the nested case seemed insane (if doable at all,
> considering VMCS shadowing), and hence the
> From: Ting-Wei Lan [mailto:lant...@gmail.com]
> Sent: Sunday, July 26, 2015 12:58 AM
>
> When using Linux >= 3.19 (commit 47591df) as dom0 on some Intel Ironlake
> devices, It is possible to encounter graphics issues that make screen
> unreadable or crash the system. It was reported in freedeskt
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Tuesday, July 21, 2015 3:17 PM
> >>> On 21.07.15 at 09:05, wrote:
> >> From: Jan Beulich [mailto:jbeul...@suse.com]
> >> Sent: Tuesday, July 21, 2015 2:57 PM
> >> >>> On 21.07.15 at 02:57, wrote:
> >> >> From: Andrew Cooper [mailto:am...@
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Tuesday, July 21, 2015 2:57 PM
>
> >>> On 21.07.15 at 02:57, wrote:
> >> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew
> > Cooper
> >> Sent: Monday, July 20, 2015 4:21
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, July 20, 2015 8:24 PM
>
> >>> On 20.07.15 at 14:12, wrote:
> > On 17/07/15 20:05, Ting-Wei Lan wrote:
> >> When using Linux >= 3.19 (commit 47591df) as dom0 on some Intel Ironlake
> >> devices, It is possible to encounter graphics iss
> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew Cooper
> Sent: Monday, July 20, 2015 4:21 PM
>
> On 20/07/2015 02:28, Tian, Kevin wrote:
> >> From: Ting-Wei Lan [mailto:lant...@gmail.com]
> >> Sent: Saturday, July 18, 2015 3:06 AM
>
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Thursday, July 16, 2015 7:57 PM
>
> Several error paths would end up freeing scope->devices twice.
>
> Signed-off-by: Andrew Cooper
> CC: Jan Beulich
> CC: Elena Ufimtseva
> CC: Yang Zhang
> CC: Kevin Tian
Acked-by: Kevin Tian
> From: Ting-Wei Lan [mailto:lant...@gmail.com]
> Sent: Saturday, July 18, 2015 3:06 AM
>
> When using Linux >= 3.19 (commit 47591df) as dom0 on some Intel Ironlake
> devices, It is possible to encounter graphics issues that make screen
> unreadable or crash the system. It was reported in freedesk
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Friday, July 17, 2015 11:11 PM
>
> On 17/07/15 15:01, Wei Liu wrote:
> > On Fri, Jul 17, 2015 at 02:43:05PM +0100, Jan Beulich wrote:
> > On 17.07.15 at 15:21, wrote:
> >>> The major concern seems to be around the PCI allocation
> From: Chen, Tiejun
> Sent: Friday, July 17, 2015 8:45 AM
>
> This patch extends the existing hypercall to support rdm reservation policy.
> We return error or just throw out a warning message depending on whether
> the policy is "strict" or "relaxed" when reserving RDM regions in pfn space.
> No
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Saturday, June 20, 2015 2:45 AM
>
> The two routines share most of their logic.
>
> Signed-off-by: Boris Ostrovsky
> Reviewed-by: Dietmar Hahn
Reviewed-by: Kevin Tian
> ---
> xen/arch/x86/hvm/vpmu.c| 75
> ++
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Saturday, June 20, 2015 2:45 AM
>
> Add support for privileged PMU mode (XENPMU_MODE_ALL) which allows privileged
> domain (dom0) profile both itself (and the hypervisor) and the guests. While
> this mode is on profiling in guests
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Saturday, June 20, 2015 2:45 AM
>
> Move some VPMU initilization operations into __initcalls to avoid performing
> same tests and calculations for each vcpu.
>
> Signed-off-by: Boris Ostrovsky
> Acked-by: Jan Beulich
Acked-by:
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Saturday, June 20, 2015 2:45 AM
>
> Add runtime interface for setting PMU mode and flags. Three main modes are
> provided:
> * XENPMU_MODE_OFF: PMU is not virtualized
> * XENPMU_MODE_SELF: Guests can access PMU MSRs and receive P
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Wednesday, July 08, 2015 9:09 PM
>
> On 08/07/2015 13:46, Jan Beulich wrote:
> On 08.07.15 at 13:00, wrote:
> >>> @@ -1848,6 +1869,33 @@ static struct hvm_function_table __initdata
> >>> vmx_function_table = {
> >>> .enabl
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, July 08, 2015 8:46 PM
>
> >>> On 08.07.15 at 13:00, wrote:
> >> @@ -1848,6 +1869,33 @@ static struct hvm_function_table __initdata
> >> vmx_function_table = {
> >> .enable_msr_exit_interception = vmx_enable_msr_exit_intercepti
> From: Wu, Feng
> Sent: Wednesday, July 08, 2015 7:52 PM
> > > > > + * - For lowest-priority interrupts, we find the destination vCPU
> > > > > from the
> > > > > + * guest vector using vector-hashing mechanism and return true.
> > > > > This
> > > > follows
> > > > > + * the hardware behavi
> From: Wu, Feng
> Sent: Wednesday, July 08, 2015 7:05 PM
>
>
> > -Original Message-
> > From: Wu, Feng
> > Sent: Wednesday, July 08, 2015 6:32 PM
> > To: Tian, Kevin; xen-devel@lists.xen.org
> > Cc: k...@xen.org; jbeul...@suse.com; an
> From: Wu, Feng
> Sent: Wednesday, July 08, 2015 6:32 PM
>
>
>
> > -Original Message-
> > From: Tian, Kevin
> > Sent: Wednesday, July 08, 2015 6:23 PM
> > To: Wu, Feng; xen-devel@lists.xen.org
> > Cc: k...@xen.org; jbeul...@suse.com;
> From: Wu, Feng
> Sent: Wednesday, July 08, 2015 6:11 PM
> > From: Tian, Kevin
> > Sent: Wednesday, July 08, 2015 5:06 PM
> >
> > > From: Wu, Feng
> > > Sent: Wednesday, June 24, 2015 1:18 PM
> > >
> > > Currently, we don't sup
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> Enable VT-d Posted-Interrupts and add a command line
> parameter for it.
>
> Signed-off-by: Feng Wu
> ---
> v3:
> Remove the redundant "no intremp then no intpost" logic
>
> docs/misc/xen-command-line.markdown | 9 -
> xen/d
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> The basic idea here is:
> 1. When vCPU's state is RUNSTATE_running,
> - set 'NV' to 'Notification Vector'.
> - Clear 'SN' to accpet PI.
> - set 'NDST' to the right pCPU.
> 2. When vCPU's state is RUNSTATE_blocked
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> When a vCPU is running in Root mode and a notification event
> has been injected to it. we need to set VCPU_KICK_SOFTIRQ for
> the current cpu, so the pending interrupt in PIRR will be
> synced to vIRR before VM-Exit in time.
>
> Signe
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> This patch includes the following aspects:
> - Add a global vector to wake up the blocked vCPU
> when an interrupt is being posted to it (This
> part was sugguested by Yang Zhang ).
> - Adds a new per-vCPU tasklet to wakeup the bloc
> From: Wu, Feng
> Sent: Wednesday, June 24, 2015 1:18 PM
>
> When guest changes its interrupt configuration (such as, vector, etc.)
> for direct-assigned devices, we need to update the associated IRTE
> with the new guest vector, so external interrupts from the assigned
> devices can be injected
601 - 700 of 920 matches
Mail list logo