Re: [Xen-devel] Testing Xen 4.5 and PCI/VGA Passthrough - my regression was fixed

2015-04-03 Thread Zir Blazer
>> While I didn't tested a lot, nearly everything seems to be working. The only >> discovered two issues are: >> It may be just placebo, but I think that the DomU takes a bit more time >> while booting, and also after I shut down it from inside. With xl list, I >> see that it stays around 20 sec

[Xen-devel] [rumpuserxen test] 50312: regressions - FAIL

2015-04-03 Thread osstest service user
flight 50312 rumpuserxen real [real] http://logs.test-lab.xenproject.org/osstest/logs/50312/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866 build-i386-rumpuserxe

[Xen-devel] [RFC PATCH 4/7] xen: libxc: libxl: report per-CPU cache occupancy up to libxl

2015-04-03 Thread Dario Faggioli
Signed-off-by: Dario Faggioli --- tools/libxc/include/xenctrl.h |2 + tools/libxc/xc_psr.c | 19 + tools/libxl/libxl.h |4 +++ tools/libxl/libxl_psr.c | 59 + xen/arch/x86/sysctl.c | 14 ++

[Xen-devel] [RFC PATCH 5/7] xen: libxc: libxl: allow for attaching and detaching a CPU to CMT

2015-04-03 Thread Dario Faggioli
Signed-off-by: Dario Faggioli --- tools/libxc/include/xenctrl.h |2 ++ tools/libxc/xc_psr.c | 34 ++ tools/libxl/libxl.h |2 ++ tools/libxl/libxl_psr.c | 30 ++ xen/arch/x86/sysctl.c | 28 ++

[Xen-devel] [RFC PATCH 6/7] xl: report per-CPU cache occupancy up to libxl

2015-04-03 Thread Dario Faggioli
Now that the functionallity is wired, from within Xen up to libxl, use that to implement a new mode for `xl psr-cmt-show', by means of the '-c' switch. With some pCPUs attached to CMT, the output looks as follows: [root@redbrick ~]# xl psr-cmt-show -c cache_occupancy Socket 0: 46080 KB T

[Xen-devel] [RFC PATCH 1/7] x86: improve psr scheduling code

2015-04-03 Thread Dario Faggioli
From: Chao Peng Switching RMID from previous vcpu to next vcpu only needs to write MSR_IA32_PSR_ASSOC once. Write it with the value of next vcpu is enough, no need to write '0' first. Idle domain has RMID set to 0 and because MSR is already updated lazily, so just switch it as it does. Also move

[Xen-devel] [RFC PATCH 2/7] Xen: x86: print max usable RMID during init

2015-04-03 Thread Dario Faggioli
Just print it. Signed-off-by: Dario Faggioli --- xen/arch/x86/psr.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c index c902625..0f2a6ce 100644 --- a/xen/arch/x86/psr.c +++ b/xen/arch/x86/psr.c @@ -111,7 +111,8 @@ static void __i

[Xen-devel] [RFC PATCH 7/7] xl: allow for attaching and detaching a CPU to CMT

2015-04-03 Thread Dario Faggioli
Now that the functionallity is wired, from within Xen up to libxl, use that to implement a new mode for `xl psr-cmt-attach' and `xl psr-cmt-detach', by means of a new '-c' switch: [root@redbrick ~]# xl psr-cmt-detach -c 4 [root@redbrick ~]# xl psr-cmt-attach -c 121 Signed-off-by: Dario Faggioli

[Xen-devel] [RFC PATCH 0/7] Intel Cache Monitoring: Current Status and Future Opportunities

2015-04-03 Thread Dario Faggioli
Hi Everyone, This RFC series is the outcome of an investigation I've been doing about whether we can take better advantage of features like Intel CMT (and of PSR features in general). By "take better advantage of" them I mean, for example, use the data obtained from monitoring within the scheduler

[Xen-devel] [RFC PATCH 3/7] xen: psr: reserve an RMID for each core

2015-04-03 Thread Dario Faggioli
This allows for a new item to be passed as part of the psr= boot option: "percpu_cmt". If that is specified, Xen tries, at boot time, to associate an RMID to each core. XXX This all looks rather straightforward, if it weren't for the fact that it is, apparently, more common than I though t

[Xen-devel] [PATCH v4 3/3] xentrace: Implement cpu mask range parsing of human values (-c).

2015-04-03 Thread Konrad Rzeszutek Wilk
Instead of just using -c 0x we can also use: -c -, -c ,, or a combination of them, or 'all' for all cpus. This new format can include just singular CPUs: -c , or ranges without an start or end (and xentrace will figure out the values), such as: -c - (which will include cpu0, cpu1, and cpu2) or -c

[Xen-devel] [PATCH v4 2/3] libxc/xentrace: Use xc_cpumap_t for xc_tbuf_set_cpu_mask

2015-04-03 Thread Konrad Rzeszutek Wilk
From: George Dunlap xentrace is the only caller at the moment. Split the cpu and event mask setting out into seperate functions, but leave the current limit of 32 bits for masks passed in from the command-line. Based on a patch from Konrad Rzeszutek Wilk Signed-off-by: George Dunlap Signed-o

[Xen-devel] [PATCH v4] Support CPU list parsing in xentrace.

2015-04-03 Thread Konrad Rzeszutek Wilk
Hey George and Ian, Since v3 [http://lists.xen.org/archives/html/xen-devel/2015-03/msg02986.html]: - Rebased code on George's patch. - Added support for 'all' in CPU parsing. In v2 [http://lists.xen.org/archives/html/xen-devel/2014-06/msg01835.html]: - Redid the code per George's feedback. -

[Xen-devel] [PATCH v4 1/3] libxl/cpumap: Add xc_cpumap_[setcpu, clearcpu, testcpu] to complement xc_cpumap_alloc.

2015-04-03 Thread Konrad Rzeszutek Wilk
We export the xc_cpumap_alloc but not the bit operations. One could include 'xc_bitops.h' but that is naughty - so instead we just export the proper functions to do it on the xc_cpumap_t typedef. Signed-off-by: Konrad Rzeszutek Wilk v2: Use our own macro to make sure ARM is not affected nega

[Xen-devel] [PATCH V3 2/3] libxl: acquire a job when destroying a domain

2015-04-03 Thread Jim Fehlig
A job should be acquired at the beginning of a domain destroy operation, not at the end when cleaning up the domain. Fix two occurrences of this late job acquisition in the libxl driver. Doing so renders libxlDomainCleanupJob unused, so it is removed. Signed-off-by: Jim Fehlig --- Unchanged fr

[Xen-devel] [PATCH V3 0/3] libxl: domain destroy fixes

2015-04-03 Thread Jim Fehlig
V3 of a small series to fix issues wrt domain destroy V1: https://www.redhat.com/archives/libvir-list/2015-March/msg01337.html V2: https://www.redhat.com/archives/libvir-list/2015-April/msg00072.html In this version, patch 3 is changed a bit to provide a wrapper for unlocking, destroying, and lo

[Xen-devel] [PATCH V3 1/3] libxl: Move job acquisition in libxlDomainStart to callers

2015-04-03 Thread Jim Fehlig
Let callers of libxlDomainStart decide when it is appropriate to acquire a job on the associated virDomainObj. Signed-off-by: Jim Fehlig --- Job handling in the migration code is currently broken/incomplete, so fixing it is deferred to a follow-up series I'm working on. src/libxl/libxl_domain.

[Xen-devel] [PATCH V3 3/3] libxl: drop virDomainObj lock when destroying a domain

2015-04-03 Thread Jim Fehlig
A destroy operation can take considerable time on large memory domains due to scrubbing the domain's memory. Unlock the virDomainObj while libxl_domain_destroy is executing. Implement libxlDomainDestroyInternal wrapper to handle unlocking, calling destroy, and locking. Change all callers of libx

Re: [Xen-devel] [libvirt] [PATCH V2 0/3] libxl: domain destroy fixes

2015-04-03 Thread Jim Fehlig
Jim Fehlig wrote: > V2 of a small series to fix issues wrt domain destroy > > https://www.redhat.com/archives/libvir-list/2015-March/msg01337.html > > Comments from Konrad and Martin are addressed in this version. > > Jim Fehlig (3): > libxl: Move job acquisition in libxlDomainStart to callers >

Re: [Xen-devel] [PATCH v5 3/7] libxl/libxl_domain_info: Log if domain not found.

2015-04-03 Thread Ian Murray
On 03/04/15 21:02, Konrad Rzeszutek Wilk wrote: > If we cannot find the domain - log an error (and still > continue returning an error). Forgive me if I am misunderstanding the effect of this patch (I tried to find the original rationale but failed). If the effect is that commands such as xl domid

[Xen-devel] [PATCH v5 4/7] libxl/vcpuset: Print error if libxl_set_vcpuonline returns ERROR_DOMAIN_NOTFOUND

2015-04-03 Thread Konrad Rzeszutek Wilk
Instead of just printing an generic error. Signed-off-by: Konrad Rzeszutek Wilk Acked-by: Ian Campbell --- tools/libxl/xl_cmdimpl.c | 9 +++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c index 1c07ac6..0ccf257 100644 ---

[Xen-devel] [PATCH v5 3/7] libxl/libxl_domain_info: Log if domain not found.

2015-04-03 Thread Konrad Rzeszutek Wilk
If we cannot find the domain - log an error (and still continue returning an error). Signed-off-by: Konrad Rzeszutek Wilk Acked-by: Ian Campbell --- tools/libxl/libxl.c | 6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c index c0e9

[Xen-devel] [PATCH v5 6/7] libxl/vcpuset: Remove useless limit on max_vcpus.

2015-04-03 Thread Konrad Rzeszutek Wilk
The check is superflous. If the 'max_vcpus' (argument value) is greater than pCPU and --ignore-host has not been supplied we would print an warning and return and not call this code. If the --ignore-host parameter had been used we would never end up in this condition and enforce 'max_vcpus'. The

[Xen-devel] [PATCH v5 7/7] libxl/vcpu-set - allow to decrease vcpu count on overcommitted guests (v5)

2015-04-03 Thread Konrad Rzeszutek Wilk
We have a check to warn the user if they are overcommitting. But the check only checks the hosts CPU amount and does not take into account the case when the user is trying to fix the overcommit. That is - they want to limit the amount of online VCPUs. This fix allows the user to offline vCPUs with

[Xen-devel] [PATCH v5 1/7] libxl: Add ERROR_DOMAIN_NOTFOUND for libxl_domain_info when it cannot find the domain

2015-04-03 Thread Konrad Rzeszutek Wilk
And use that for all of its callers in the tree. Signed-off-by: Konrad Rzeszutek Wilk Acked-by: Ian Campbell --- tools/libxl/libxl.c | 19 +++ tools/libxl/libxl.h | 9 - tools/libxl/libxl_types.idl | 1 + tools/libxl/xl_cmdimpl.c| 4 ++-- 4 files c

[Xen-devel] [PATCH v5 2/7] libxl: In libxl_set_vcpuonline check for maximum number of VCPUs against the cpumap.

2015-04-03 Thread Konrad Rzeszutek Wilk
There is no sense in trying to online (or offline) CPUs when the size of cpumap is greater than the maximum number of VCPUs the guest can go to. As such fail the operation if the count of CPUs to online is greater than what the guest started with. For the offline case we do not check (as the bits

[Xen-devel] [PATCH v5] Fix xl vcpu-set to decrrease an guest vCPU amount without complaints.

2015-04-03 Thread Konrad Rzeszutek Wilk
Hey Ian, Since v4: [http://lists.xenproject.org/archives/html/xen-devel/2015-03/msg03737.html] - Squashed libxl__check_max in libxl_set_vcpuonline - Added Acked-by In v3 [http://lists.xen.org/archives/html/xen-devel/2015-03/msg02822.html] - Constify the libxl_dominfo and handle libxl_domain_in

[Xen-devel] [PATCH v5 5/7] libxl/vcpuset: Return error value if failed.

2015-04-03 Thread Konrad Rzeszutek Wilk
The function does not return any values at all. Convert the internal libxl errors (ERROR_FAIL, ..., etc) to 1. Signed-off-by: Konrad Rzeszutek Wilk Acked-by: Ian Campbell --- tools/libxl/xl_cmdimpl.c | 17 + 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/tools/lib

Re: [Xen-devel] [PATCH v3 3/3] xentrace: Implement cpu mask range parsing of human values (-c).

2015-04-03 Thread Konrad Rzeszutek Wilk
On Tue, Mar 31, 2015 at 12:31:34PM +0100, George Dunlap wrote: > On 03/24/2015 03:39 PM, Konrad Rzeszutek Wilk wrote: > > Instead of just using -c 0x we can > > also use -c - or -c , > > or a combination of them. Also it can include just > > singular CPUs: -c , or ranges without an > > start or end

[Xen-devel] [libvirt test] 50308: regressions - FAIL

2015-04-03 Thread osstest service user
flight 50308 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/50308/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt 9 guest-start fail REGR. vs. 50277 Tests which did not succe

[Xen-devel] [ovmf test] 50307: regressions - FAIL

2015-04-03 Thread osstest service user
flight 50307 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/50307/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-freebsd10-amd64 14 guest-localmigrate/x10 fail REGR. vs. 36764 test-amd64-i386-freebsd10-i3

[Xen-devel] Ongoing issue with libvirt-xen driver for Openstack Nova

2015-04-03 Thread Boris Derzhavets
Could you, please, point to the most recent commit in https://git.openstack.org/cgit/openstack/nova/ for which procedure described in http://wiki.xen.org/wiki/OpenStack_via_DevStack provide an ability to launch nova instances via horizion or nova CLI. I am aware of bug https://bugs.launc

[Xen-devel] [PATCH v1] arm: irq: increase size of irq from uint8_t to uint32_t

2015-04-03 Thread Iurii Konovalenko
From: Iurii Konovalenko On some platforms IRQ number can be greater then 255, so greater size for IRQ is needed to avoid overflow for some structure fileds and paramters. It concerns XEN_DOMCTL_irq_permission and IRQ pssthrough API functions. --- tools/libxc/include/xenctrl.h | 10 +- to

Re: [Xen-devel] [PATCH v4 2/7] libxl: In libxl_set_vcpuonline check for maximum number of VCPUs against the cpumap.

2015-04-03 Thread Konrad Rzeszutek Wilk
On Tue, Mar 31, 2015 at 04:57:51PM +0100, Ian Campbell wrote: > On Mon, 2015-03-30 at 11:26 -0400, Konrad Rzeszutek Wilk wrote: > > There is no sense in trying to online (or offline) CPUs when the size of > > cpumap is greater than the maximum number of VCPUs the guest can go to. > > > > As such f

[Xen-devel] [qemu-upstream-4.4-testing test] 50306: regressions - FAIL

2015-04-03 Thread osstest service user
flight 50306 qemu-upstream-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/50306/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-localmigrate/x10 fail REGR. vs. 50274 Reg

Re: [Xen-devel] [PATCH] tools/libxl new bitmap functions

2015-04-03 Thread Dario Faggioli
On Thu, 2015-04-02 at 15:34 -0400, Konrad Rzeszutek Wilk wrote: > On Thu, Apr 02, 2015 at 11:38:16AM -0600, Linda Jacobson wrote: > > --- a/tools/libxl/libxl_utils.c > > +++ b/tools/libxl/libxl_utils.c > > +goto out; > > +} > > + > > +for (int bit = 0; bit < (size * 8); bit++) > >

Re: [Xen-devel] [PATCH] tools/libxl new bitmap functions

2015-04-03 Thread Dario Faggioli
On Fri, 2015-04-03 at 07:48 -0600, Linda wrote: > Dario, > Hi, One thing: here in the ML, please, don't top post. > I like your comments on naming. We'll see what others say. > As far as difference, at least as I've implemented it, it's the > exclusive or. > Well, then I'd call it lib

[Xen-devel] [PATCH] XSA120 follows to the Linux kernel.

2015-04-03 Thread Konrad Rzeszutek Wilk
Hey David and Boris, Please see the two patches - the first one fixes an situation that the original XSA-120 patch hadn't considered. The second patch is more of just a cleanup. Can be 4.1 material. drivers/xen/xen-pciback/pciback_ops.c | 4 1 file changed, 4 deletions(-) Konrad Rzeszutek

[Xen-devel] [PATCH 2/2] xen/pciback: Remove is_busmaster=0 as pci_disable_device does it already

2015-04-03 Thread Konrad Rzeszutek Wilk
There is no need for this. Signed-off-by: Konrad Rzeszutek Wilk --- drivers/xen/xen-pciback/pciback_ops.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/drivers/xen/xen-pciback/pciback_ops.c b/drivers/xen/xen-pciback/pciback_ops.c index 26e6513..a131733 100644 --- a/drivers/xen/xen-pcibac

[Xen-devel] [PATCH 1/2] xen/pciback: Don't disable PCI_COMMAND on PCI device reset.

2015-04-03 Thread Konrad Rzeszutek Wilk
There is no need for this at all. Worst it means that if the guest tries to write to BARs it could lead (on certain platforms) to PCI SERR errors. Please note that with af6fc858a35b90e89ea7a7ee58e66628c55c776b "xen-pciback: limit guest control of command register" a guest is still allowed to enabl

Re: [Xen-devel] [PATCH RFC v2 3/3] xen: rework paging_log_dirty_op to work with hvm guests

2015-04-03 Thread Tim Deegan
Hi, At 20:46 +0100 on 02 Apr (1428007593), Andrew Cooper wrote: > On 02/04/15 11:26, Roger Pau Monne wrote: > > When the caller of paging_log_dirty_op is a hvm guest Xen would choke when > > trying to copy the dirty bitmap to the guest because the paging lock is > > already held. > > Are you sure

Re: [Xen-devel] [PATCH] tools/libxl new bitmap functions

2015-04-03 Thread Linda
Dario, I like your comments on naming. We'll see what others say. As far as difference, at least as I've implemented it, it's the exclusive or. To all, I've been thinking about Konrad's comment that we should disallow bitmaps of unequal size, in the XOR/difference function. I've i

Re: [Xen-devel] [RFC v1 12/15] vmx: Properly handle notification event when vCPU is running

2015-04-03 Thread Konrad Rzeszutek Wilk
On Fri, Apr 03, 2015 at 02:00:24AM +, Wu, Feng wrote: > > > > -Original Message- > > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > > Sent: Friday, April 03, 2015 3:15 AM > > To: Tian, Kevin > > Cc: Wu, Feng; Zhang, Yang Z; xen-devel@lists.xen.org; k...@xen.org; > > jbe

Re: [Xen-devel] [PATCH 8/9] qspinlock: Generic paravirt support

2015-04-03 Thread Peter Zijlstra
On Thu, Apr 02, 2015 at 09:48:34PM +0200, Peter Zijlstra wrote: > @@ -158,20 +257,20 @@ static void pv_wait_head(struct qspinloc > void __pv_queue_spin_unlock(struct qspinlock *lock) > { > struct __qspinlock *l = (void *)lock; > + struct pv_hash_bucket *hb; > > if (xchg(&l->lock

Re: [Xen-devel] Size of irq field

2015-04-03 Thread Julien Grall
On 03/04/2015 14:40, Iurii Konovalenko wrote: Hi, Ian! Hi, Julien! Hi Iurii, Thank you for your replies. On Thu, Apr 2, 2015 at 6:19 PM, Ian Campbell mailto:ian.campb...@citrix.com>> wrote: > Please can you give some example of this? On Thu, Apr 2, 2015 at 6:34 PM, Julien Grall mailto:jul

Re: [Xen-devel] [PATCH 07/19] xen: arm: Annotate trap handler for HCR_EL2.{TWI, TWE, TSC}

2015-04-03 Thread Julien Grall
Hi Ian, On 31/03/2015 12:07, Ian Campbell wrote: Reference the bit which enables the trap and the section/page which describes what that bit enables. These ones are pretty trivial, included for completeness. Signed-off-by: Ian Campbell --- xen/arch/arm/traps.c | 17 + 1 f

Re: [Xen-devel] [PATCH 06/19] xen: arm: add minimum exception level argument to trap handler helpers

2015-04-03 Thread Julien Grall
Hi Ian, On 31/03/2015 12:07, Ian Campbell wrote: Removes a load of boiler plate. Signed-off-by: Ian Campbell --- xen/arch/arm/traps.c | 65 +- 1 file changed, 32 insertions(+), 33 deletions(-) diff --git a/xen/arch/arm/traps.c b/xen/arch/ar

Re: [Xen-devel] [PATCH 05/19] xen: arm: Add and use r/o+raz and w/o+wi helpers

2015-04-03 Thread Julien Grall
Hi Ian, On 31/03/2015 12:07, Ian Campbell wrote: Signed-off-by: Ian Campbell --- xen/arch/arm/traps.c | 52 -- 1 file changed, 33 insertions(+), 19 deletions(-) diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c index 8b1846a..ebc09f9

Re: [Xen-devel] Size of irq field

2015-04-03 Thread Iurii Konovalenko
Hi, Ian! Hi, Julien! Thank you for your replies. On Thu, Apr 2, 2015 at 6:19 PM, Ian Campbell wrote: > Please can you give some example of this? On Thu, Apr 2, 2015 at 6:34 PM, Julien Grall wrote: > Can you give an example of files/structures using uint8_t for IRQ? As Julien wrote, it is relate

[Xen-devel] [xen-unstable test] 50291: regressions - FAIL

2015-04-03 Thread osstest service user
flight 50291 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/50291/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-freebsd10-i386 11 guest-localmigrate fail REGR. vs. 36514 test-amd64-i386-free

Re: [Xen-devel] Implementing working set tracker in xen

2015-04-03 Thread HANNAS YAYA Issa
Thank you a lot Tim.Your Method which consist of using shadow page table help me. However when I use the method shadow_blow_tables() I don't think it makes all page unavailable. because the the number of page fault (I get it from sh_page_fault) does not seem to increase. when shadow_blow_table

[Xen-devel] [PATCH v9 01/30] xen/PCI: Don't use deprecated function pci_scan_bus_parented()

2015-04-03 Thread Yijing Wang
From: Arnd Bergmann Use pci_scan_root_bus() instead of deprecated function pci_scan_bus_parented(). Signed-off-by: Arnd Bergmann Signed-off-by: Yijing Wang CC: Konrad Rzeszutek Wilk CC: xen-de...@lists.xenproject.org --- drivers/pci/xen-pcifront.c | 16 +--- 1 files changed, 13

Re: [Xen-devel] [PATCH] tools/libxl new bitmap functions

2015-04-03 Thread Dario Faggioli
On Thu, 2015-04-02 at 11:38 -0600, Linda Jacobson wrote: > From: Linda > > Added bitmap functions for union intersection and difference betweenn two > bitmaps > Just wondering, about union and intersection, are them the best names for these operations, or do we want libxl_bitmap_or() and libxl_

[Xen-devel] [qemu-mainline test] 50290: regressions - FAIL

2015-04-03 Thread osstest service user
flight 50290 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/50290/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-freebsd10-i386 13 guest-localmigrate.2fail REGR. vs. 36709 Regressions which a

Re: [Xen-devel] [RFC v1 08/15] Update IRTE according to guest interrupt config changes

2015-04-03 Thread Tian, Kevin
> From: Wu, Feng > Sent: Thursday, April 02, 2015 4:03 PM > > > > > -Original Message- > > From: Tian, Kevin > > Sent: Thursday, April 02, 2015 2:50 PM > > To: Wu, Feng; xen-devel@lists.xen.org > > Cc: jbeul...@suse.com; k...@xen.org; Zhang, Yang Z > > Subject: RE: [RFC v1 08/15] Update

Re: [Xen-devel] Nested EPT flushes on p2m change?

2015-04-03 Thread Tian, Kevin
> From: Tim Deegan [mailto:t...@xen.org] > Sent: Thursday, March 26, 2015 7:10 PM > > Hi, VMX maintainers, > > I was looking at the nested EPT code while following up on Ed's email > about altp2m design, and I can't see where nested-EPT entries get > removed when a host EPT entry is removed/chang