On Tue, Oct 31, 2017 at 03:25:39PM +, Wei Liu wrote:
> On Tue, Oct 31, 2017 at 10:20:11AM -0500, Doug Goldstein wrote:
> > Prefer using the character device over the proc file if the character
> > device exists.
> >
> > CC: Elena Ufimtseva
> > CC: Ian Ja
Kevin Tian
> Reviewed-by: Boris Ostrovsky
> Acked-by: George Dunlap
> ---
> Cc: Christoph Egger
> Cc: Jan Beulich
> Cc: Andrew Cooper
> Cc: Boris Ostrovsky
> Cc: Suravee Suthikulpanit
> Cc: Jun Nakajima
> Cc: Kevin Tian
> Cc: Elena Ufimtseva
Hmm, I dont s
> Reviewed-by: Andrew Cooper
> Acked-by: George Dunlap
> Reviewed-by: Paul Durrant
> Acked-by: Elena Ufimtseva
> Reviewed-by: Kevin Tian
> ---
> Changes since v1:
> - Remove dom0pvh option from the command line docs.
> - Bump domctl interface version due to the remov
uot;hvm",
> device_model_version="none". This is done because otherwise xl would start
> parsing PV like options, and filling the PV struct at libxl_domain_build_info
> (which in turn pollutes the HVM one because it's a union).
>
> Signed-off-by: Roger Pau Monné
On Thu, Jan 19, 2017 at 01:29:15AM -0700, Jan Beulich wrote:
> >>> On 18.01.17 at 20:56, wrote:
> > I am looking at rmrr_identity_mapping where the RMRR paddr get converted
> > to pfn and then mapped with iommu.
> > If ( rmrr->end_address & ~PAGE_SHIFT_MASK_4K ) == 0, the while loop
> > while
On Thu, Jan 12, 2017 at 04:44:42AM -0700, Jan Beulich wrote:
> >>> On 10.01.17 at 23:57, wrote:
> > Changes in v13:
> > - Implement feedback from Kevin Tian.
> >
> > https://lists.xenproject.org/archives/html/xen-devel/2015-10/msg03169.html
> >
> > https://lists.xenproject.org/archives/h
On Fri, Jan 06, 2017 at 02:34:17PM +, Andrew Cooper wrote:
> Found by a Travis RANDCONFIG run.
>
> Signed-off-by: Andrew Cooper
Acked-by: Elena Ufimtseva
> ---
> CC: Jan Beulich
> CC: Elena Ufimtseva
> ---
> xen/arch/x86/gdbstub.c| 8
> xen/ar
On Fri, Jul 08, 2016 at 08:20:03PM +0100, Andrew Cooper wrote:
> On 08/07/2016 23:01, Elena Ufimtseva wrote:
> >
> >>> @@ -838,7 +838,6 @@ mfn_t oos_snapshot_lookup(struct domain *d, mfn_t
> >>> gmfn)
> >>>
> >>> SHADOW_ERROR(&quo
gfn)
> > unsigned long old_root_mfn;
> > struct domain_iommu *hd = dom_iommu(d);
> >
> >-if ( gfn == INVALID_GFN )
> >+if ( gfn == gfn_x(INVALID_GFN) )
> > return -EADDRNOTAVAIL;
> > ASSERT(!(gfn >> DEFAULT_DOMAIN_ADDRESS_WIDTH));
> >
> >diff --git a/xen/drivers/passthrough/vtd/iommu.c
> >b/xen/drivers/passthrough/vtd/iommu.c
> >index f010612..c322b9f 100644
> >--- a/xen/drivers/passthrough/vtd/iommu.c
> >+++ b/xen/drivers/passthrough/vtd/iommu.c
> >@@ -611,7 +611,7 @@ static int __must_check iommu_flush_iotlb(struct domain
> >*d,
> > if ( iommu_domid == -1 )
> > continue;
> >
> >-if ( page_count != 1 || gfn == INVALID_GFN )
> >+if ( page_count != 1 || gfn == gfn_x(INVALID_GFN) )
> > rc = iommu_flush_iotlb_dsi(iommu, iommu_domid,
> > 0, flush_dev_iotlb);
> > else
> >@@ -640,7 +640,7 @@ static int __must_check iommu_flush_iotlb_pages(struct
> >domain *d,
> >
> > static int __must_check iommu_flush_iotlb_all(struct domain *d)
> > {
> >-return iommu_flush_iotlb(d, INVALID_GFN, 0, 0);
> >+return iommu_flush_iotlb(d, gfn_x(INVALID_GFN), 0, 0);
> > }
> >
> > /* clear one page's page table */
> >diff --git a/xen/drivers/passthrough/x86/iommu.c
> >b/xen/drivers/passthrough/x86/iommu.c
> >index cd435d7..69cd6c5 100644
> >--- a/xen/drivers/passthrough/x86/iommu.c
> >+++ b/xen/drivers/passthrough/x86/iommu.c
> >@@ -61,7 +61,7 @@ int arch_iommu_populate_page_table(struct domain *d)
> > unsigned long mfn = page_to_mfn(page);
> > unsigned long gfn = mfn_to_gmfn(d, mfn);
> >
> >-if ( gfn != INVALID_GFN )
> >+if ( gfn != gfn_x(INVALID_GFN) )
> > {
> > ASSERT(!(gfn >> DEFAULT_DOMAIN_ADDRESS_WIDTH));
> > BUG_ON(SHARED_M2P(gfn));
> >diff --git a/xen/include/asm-x86/guest_pt.h b/xen/include/asm-x86/guest_pt.h
> >index a8d980c..79ed4ff 100644
> >--- a/xen/include/asm-x86/guest_pt.h
> >+++ b/xen/include/asm-x86/guest_pt.h
> >@@ -32,7 +32,7 @@
> > #error GUEST_PAGING_LEVELS not defined
> > #endif
> >
> >-#define VALID_GFN(m) (m != INVALID_GFN)
> >+#define VALID_GFN(m) (m != gfn_x(INVALID_GFN))
> >
> > static inline int
> > valid_gfn(gfn_t m)
> >@@ -251,7 +251,7 @@ static inline gfn_t
> > guest_walk_to_gfn(walk_t *gw)
> > {
> > if ( !(guest_l1e_get_flags(gw->l1e) & _PAGE_PRESENT) )
> >-return _gfn(INVALID_GFN);
> >+return INVALID_GFN;
> > return guest_l1e_get_gfn(gw->l1e);
> > }
> >
> >diff --git a/xen/include/asm-x86/p2m.h b/xen/include/asm-x86/p2m.h
> >index 4ab3574..194020e 100644
> >--- a/xen/include/asm-x86/p2m.h
> >+++ b/xen/include/asm-x86/p2m.h
> >@@ -324,7 +324,7 @@ struct p2m_domain {
> > #define NR_POD_MRP_ENTRIES 32
> >
> > /* Encode ORDER_2M superpage in top bit of GFN */
> >-#define POD_LAST_SUPERPAGE (INVALID_GFN & ~(INVALID_GFN >> 1))
> >+#define POD_LAST_SUPERPAGE (gfn_x(INVALID_GFN) & ~(gfn_x(INVALID_GFN) >> 1))
> >
> > unsigned long list[NR_POD_MRP_ENTRIES];
> > unsigned int idx;
> >diff --git a/xen/include/xen/mm.h b/xen/include/xen/mm.h
> >index 7f207ec..58bc0b8 100644
> >--- a/xen/include/xen/mm.h
> >+++ b/xen/include/xen/mm.h
> >@@ -84,7 +84,7 @@ static inline bool_t mfn_eq(mfn_t x, mfn_t y)
> >
> > TYPE_SAFE(unsigned long, gfn);
> > #define PRI_gfn "05lx"
> >-#define INVALID_GFN (~0UL)
> >+#define INVALID_GFN _gfn(~0UL)
> >
> > #ifndef gfn_t
> > #define gfn_t /* Grep fodder: gfn_t, _gfn() and gfn_x() are defined above
> > */
> >
>
> --
> Julien Grall
Acked-by: Elena Ufimtseva
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Wed, Jul 06, 2016 at 02:04:17PM +0100, Julien Grall wrote:
> (CC Elena).
>
> On 06/07/16 14:01, Julien Grall wrote:
> >Also take the opportunity to convert arch/x86/debug.c to the typesafe
> >mfn and use proper printf format for MFN/GFN when the code around is
> >modified.
> >
> >Signed-off-by:
From: Elena Ufimtseva
Change gdbsx maintainer to myself.
Signed-off-by: Elena Ufimtseva
---
MAINTAINERS | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/MAINTAINERS b/MAINTAINERS
index a8e0043..e91140f 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -206,7 +206,7 @@ F: xen
Hi Julien, Andrew
I was talking to Konrad some time ago about looking into this and the
possibility of maintaining gdbsx code. I am willing sign up for this
if there are no objections.
Elena
On Tue, Jun 28, 2016 at 9:46 AM, Andrew Cooper
wrote:
> On 28/06/16 17:31, Julien Grall wrote:
>> Hi,
>>
Thanks George!
On Fri, Jun 24, 2016 at 4:37 AM, George Dunlap wrote:
> On Wed, Jun 22, 2016 at 9:16 PM, Elena Ufimtseva wrote:
>> Hello
>>
>> I am working on PCIe errors containment and XSA-124 relevant problem.
>> This is only small part of the problem and I can
Hello
I am working on PCIe errors containment and XSA-124 relevant problem.
This is only small part of the problem and I can provide more details later
if that is of someone's interest.
As the temporary solution, guest domain with passthrough device
without SRIOV gets killed when certain AER erro
> >>
> >> On Tue, Mar 1, 2016 at 1:20 PM, Elena Ufimtseva
> >> wrote:
> >> >
> >> > On Tue, Mar 01, 2016 at 08:48:30AM -0500, Meng Xu wrote:
> >> > > On Mon, Feb 29, 2016 at 12:59 PM, Konrad Rzeszutek Wilk
> >> > > w
On Tue, Mar 01, 2016 at 02:52:14PM -0500, Meng Xu wrote:
> Hi Elena,
>
> Thank you very much for sharing this! :-)
>
> On Tue, Mar 1, 2016 at 1:20 PM, Elena Ufimtseva
> wrote:
> >
> > On Tue, Mar 01, 2016 at 08:48:30AM -0500, Meng Xu wrote:
> > > O
On Tue, Mar 01, 2016 at 08:48:30AM -0500, Meng Xu wrote:
> On Mon, Feb 29, 2016 at 12:59 PM, Konrad Rzeszutek Wilk
> wrote:
> >> > Hey!
> >> >
> >> > CC-ing Elena.
> >>
> >> I think you forgot you cc.ed her..
> >> Anyway, let's cc. her now... :-)
> >>
> >> >
> >> >> We are measuring the execution
On Thu, Jan 28, 2016 at 09:55:45AM +, Dario Faggioli wrote:
> On Wed, 2016-01-27 at 15:53 +, George Dunlap wrote:
> > On 27/01/16 15:27, Konrad Rzeszutek Wilk wrote:
> > >
> > > So Elena started looking at the CPU bound and seeing how Xen
> > > behaves then
> > > and if we can improve the
On Thu, Jan 28, 2016 at 09:46:46AM +, Dario Faggioli wrote:
> On Wed, 2016-01-27 at 11:03 -0500, Elena Ufimtseva wrote:
> > On Wed, Jan 27, 2016 at 10:27:01AM -0500, Konrad Rzeszutek Wilk
> > wrote:
> > > On Wed, Jan 27, 2016 at 03:10:01PM +, George Dunlap wrote:
&
On Wed, Jan 27, 2016 at 02:01:35PM +, Dario Faggioli wrote:
> On Fri, 2016-01-22 at 11:54 -0500, Elena Ufimtseva wrote:
> > Hello all!
> >
> Hey, here I am again,
>
> > Konrad came up with a workaround that was setting the flag for domain
> > scheduler in li
On Wed, Jan 27, 2016 at 10:27:01AM -0500, Konrad Rzeszutek Wilk wrote:
> On Wed, Jan 27, 2016 at 03:10:01PM +, George Dunlap wrote:
> > On 27/01/16 14:33, Konrad Rzeszutek Wilk wrote:
> > > On Tue, Jan 26, 2016 at 11:21:36AM +, George Dunlap wrote:
> > >> On 2
On Fri, Jan 22, 2016 at 06:29:19PM +0100, Dario Faggioli wrote:
> On Fri, 2016-01-22 at 11:54 -0500, Elena Ufimtseva wrote:
> > Hello all!
> >
> Hello,
>
> > Let me put some intro to our findings. I may forget something or put
> > something
> > not too ex
On Fri, Dec 18, 2015 at 11:24 PM, quizyjones wrote:
> Is there any progress?
Hey
I did look into this and I could not find the trace of what I have
done before. So I decided to ytu and port it to current version from
this Mukesh patch:
http://lists.xen.org/archives/html/xen-devel/2014-04/msg
On Wed, Dec 16, 2015 at 9:30 AM, Konrad Rzeszutek Wilk
wrote:
> On December 16, 2015 3:08:04 AM EST, quizyjones
> wrote:
>>The version embedded with kdb only updates to 4.1.0. How can I use it
>>with xen 4.6? Or is there any other debuggers which can step in Xen?
>
> CCing Elena who poked at it
On Fri, Nov 06, 2015 at 04:05:25AM -0700, Jan Beulich wrote:
> >>> On 06.11.15 at 05:22, wrote:
> > On Wed, Oct 28, 2015 at 10:05:31AM -0600, Jan Beulich wrote:
> >> >>> On 27.10.15 at 21:36, wrote:
> >> > +static void __init add_extra_rmrr(void)
> >> > +{
> >> > +struct acpi_rmrr_unit *acpi_
On Wed, Oct 28, 2015 at 10:05:31AM -0600, Jan Beulich wrote:
> >>> On 27.10.15 at 21:36, wrote:
> > +static void __init add_extra_rmrr(void)
> > +{
> > +struct acpi_rmrr_unit *acpi_rmrr;
> > +struct acpi_rmrr_unit *rmrru;
> > +unsigned int dev, seg, i;
> > +unsigned long pfn;
> > +
From: Elena Ufimtseva
On some platforms firmware fails to specify RMRR regions in ACPI tables and thus
those regions will not be mapped in dom0 or guests and may cause IO Page Faults
and prevent dom0 from booting in PVH mode.
New Xen command line option rmrr allows to specify such devices and
From: Elena Ufimtseva
For sbdf's parsing in RMRR command line add __parse_pci with additional
parameter def_seg. __parse_pci will help to identify if segment was
found in string being parsed or default segment was used.
Make a wrapper parse_pci so the rest of the callers are not aff
From: Elena Ufimtseva
Sending v12 with mostly cosmetic fixes from Jan's review on v11.
Add Xen command line option rmrr to specify RMRR regions that are not defined
in ACPI thus causing IO Page Fault while booting dom0 in PVH mode.
These additional regions will be added to the list of
From: Elena Ufimtseva
In preparation for auxiliary RMRR data provided on Xen
command line, make RMRR adding a separate function.
Also free memery for rmrr device scope in error path.
Signed-off-by: Elena Ufimtseva
Reviewed-by: Konrad Rzeszutek Wilk
---
xen/drivers/passthrough/vtd/dmar.c
On Mon, Oct 26, 2015 at 07:38:06AM -0600, Jan Beulich wrote:
> >>> On 22.10.15 at 19:13, wrote:
> > From: Elena Ufimtseva
> >
> > On some platforms RMRR regions may be not specified in ACPI and thus will
> > not
> > be mapped 1:1 in dom0.
>
From: Elena Ufimtseva
Its being a while since the last v10. There are subtle changes and fewer
patches in the series and will be nice to move it out of my way.
Please review and comment.
Add Xen command line option rmrr to specify RMRR
regions for devices that
From: Elena Ufimtseva
For sbdf's parsing in RMRR command line add __parse_pci with additional
parameter def_seg. __parse_pci will help to identify if segment was
found in string being parsed or default segment was used.
Make a wrapper parse_pci so the rest of the callers are not aff
From: Elena Ufimtseva
On some platforms RMRR regions may be not specified in ACPI and thus will not
be mapped 1:1 in dom0. This causes IO Page Faults and prevents dom0 from booting
in PVH mode. New Xen command line option rmrr allows to specify such devices and
memory regions. These regions are
From: Elena Ufimtseva
In preparation for auxiliary RMRR data provided on Xen
command line, make RMRR adding a separate function.
Also free memery for rmrr device scope in error path.
Signed-off-by: Elena Ufimtseva
Reviewed-by: Konrad Rzeszutek Wilk
---
xen/drivers
On Mon, Sep 28, 2015 at 01:04:48AM -0600, Jan Beulich wrote:
> >>> On 25.09.15 at 22:59, wrote:
> > From: Elena Ufimtseva
> >
> > This patch addresses a regression introduced by commit
> > 5ae03990c120a7b3067a52d9784c9aa72c0705a6 in new set_identity_p2m_entr
From: Elena Ufimtseva
This patch addresses a regression introduced by commit
5ae03990c120a7b3067a52d9784c9aa72c0705a6 in new set_identity_p2m_entry.
RMRRs are not being mapped in IOMMU for PVH Dom0. This causes pages faults and
some long 'hang-like' delays during Dom0 PVH boot
On Fri, Sep 25, 2015 at 12:36:09AM -0600, Jan Beulich wrote:
> >>> On 25.09.15 at 01:53, wrote:
> > Permissions for p2m entry of read-only
> > mmio regions are left unchanged as leaving only 'r' cause page faults. I am
> > not sure what the reason of it yet, will try to dig it further.
>
> Yes
From: Elena Ufimtseva
This patch addresses a regression introduced by commit
5ae03990c120a7b3067a52d9784c9aa72c0705a6 in new set_identity_p2m_entry. RMRRs
are not being mapped in
IOMMU for PVH Dom0. This causes pages faults and some long 'hang-like' delays
during Dom0 PVH boot
From: Elena Ufimtseva
This patch addresses a regression introduced by commit
5ae03990c120a7b3067a52d9784c9aa72c0705a6 in new set_identity_p2m_entry. RMRRs
are not being mapped in
IOMMU for PVH Dom0. This causes pages faults and some long 'hang-like' delays
during Dom0 PVH boot
On Thu, Sep 24, 2015 at 11:29:54AM +0100, Wei Liu wrote:
> Hi Elena
>
> On Wed, Sep 23, 2015 at 11:56:12AM -0400, Elena Ufimtseva wrot
On Thu, Sep 24, 2015 at 10:18:54AM +0100, Tim Deegan wrote:
> At 15:17 +0800 on 24 Sep (1443107852), Chen, Tiejun wrote:
> > On 9/23/2015 11:56 PM, Elena Ufimtseva wrote:
> > > Hi
> > >
> > > There is a regression in RMRR patch
> > > 5ae03990
On Thu, Sep 24, 2015 at 04:31:09AM -0600, Jan Beulich wrote:
> >>> On 24.09.15 at 11:18, wrote:
> > AIUI the problem is that before the call to set_identity_p2m_entry(),
> > PVH dom0 has a p2m entry covering this range but no IOMMU entry. Is
> > that right? So the fix will be to make PVH dom0 co
Thanks!
Elena
>From fb25216760a0c17447faa1f416cc59341600dc1b Mon Sep 17 00:00:00 2001
From: Elena Ufimtseva
Date: Wed, 23 Sep 2015 11:47:49 -0400
Subject: [PATCH] RMRR reg
On Fri, Jul 24, 2015 at 04:44:36PM +0200, Dario Faggioli wrote:
> On Fri, 2015-07-24 at 12:28 +0200, Juergen Gross wrote:
> > On 07/23/2015 04:07 PM, Dario Faggioli wrote:
>
> > > FWIW, I was thinking that the kernel were a better place, as Juergen is
> > > saying, while now I'm more convinced tha
On Thu, Jul 23, 2015 at 06:01:45PM +0100, Andrew Cooper wrote:
> On 23/07/15 17:35, Elena Ufimtseva wrote:
> > Hi
> >
> > While working on bugs during boot time on large oracle server x4-8,
> > There is a problem with booting Xen on large machines with > 4TB m
- jbeul...@suse.com wrote:
> >>> On 15.07.15 at 18:15, wrote:
>
> > - jbeul...@suse.com wrote:
> >
> >> >>> On 15.07.15 at 17:27, wrote:
> >> > On Wed, Jul 15, 2015 at 08:25:06AM +0100, Jan Beulich wrote:
> >> >> >>> On 14.07.15 at 12:43, wrote:
> >> >> On 13.07.15 at 20:18, wr
- jbeul...@suse.com wrote:
> >>> On 15.07.15 at 17:27, wrote:
> > On Wed, Jul 15, 2015 at 08:25:06AM +0100, Jan Beulich wrote:
> >> >>> On 14.07.15 at 12:43, wrote:
> >> On 13.07.15 at 20:18, wrote:
> >> >> +/* Macro for RMRR inclusive range formatting. */
> >> >> +#define PRI_RMRR(s,
On Wed, Jul 15, 2015 at 08:25:06AM +0100, Jan Beulich wrote:
> >>> On 14.07.15 at 12:43, wrote:
> On 13.07.15 at 20:18, wrote:
> >> +/* Macro for RMRR inclusive range formatting. */
> >> +#define PRI_RMRR(s,e) "[%lx-%lx]"
> >
> > Just PRI_RMRR (i.e. no parens or parameters) please. And I'm
From: Elena Ufimtseva
In preparation for auxiliary RMRR data provided on Xen
command line, make RMRR adding a separate function.
Also free memory for rmrr device scope in error path.
Signed-off-by: Elena Ufimtseva
Reviewed-by: Konrad Rzeszutek Wilk
---
xen/drivers/passthrough/vtd/dmar.c
From: Elena Ufimtseva
Release memory allocated for scope.devices dmar units on various
failure paths and when disabling dmar. Set device count after
sucessfull memory allocation, not before, in device scope parsing function.
Signed-off-by: Elena Ufimtseva
---
Changes in v10:
- mark patch v6
From: Elena Ufimtseva
On some platforms RMRR regions may be not specified
in ACPI and thus will not be mapped 1:1 in dom0. This
causes IO Page Faults and prevents dom0 from booting
in PVH mode.
New Xen command line option rmrr allows to specify
such devices and memory regions. These regions are
From: Elena Ufimtseva
For sbdf's parsing in RMRR command line add __parse_pci with additional
parameter def_seg. __parse_pci will help to identify if segment was
found in string being parsed or default segment was used.
Make a wrapper parse_pci so the rest of the callers are not aff
From: Elena Ufimtseva
In preperation for patch "iommu: add rmrr Xen command line option for
extra rmrrs" which will use it.
Signed-off-by: Elena Ufimtseva
---
xen/include/xen/pci.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/include/xen/pci.h b/xen/include/xen/p
From: Elena Ufimtseva
Add Xen command line option rmrr to specify RMRR
regions for devices that are not defined in ACPI thus
causing IO Page Fault while booting dom0 in PVH mode.
These additional regions will
Subject: Ping: [PATCH v6] dmar: device scope mem leak fix
>>> On 07.07.15 at 17:17, wrote:
> From: Elena Ufimtseva
>
> Release memory allocated for scope.devices dmar units on various
> failure paths and when disabling dmar. Set device count after
> successful memory al
- wei.l...@citrix.com wrote:
> On Thu, Jul 09, 2015 at 05:00:45PM +0100, Jan Beulich wrote:
> > >>> On 09.07.15 at 17:53, wrote:
> > > - jbeul...@suse.com wrote:
> > >> >>> On 09.07.15 at 14:07, wrote:
> > >> > You are right, it needs to be rebased. I can post later rebased
> on
> > >>
- jbeul...@suse.com wrote:
> >>> On 09.07.15 at 14:07, wrote:
> > You are right, it needs to be rebased. I can post later rebased on
> memory
> > leak fix version, if you thin its a way to go.
>
> I didn't look at v9 yet, and can't predict when I will be able to.
>
> Jan
Jan
Would you
- jbeul...@suse.com wrote:
> >>> On 09.07.15 at 13:13, wrote:
> > On Thu, Jul 09, 2015 at 09:10:06AM +0100, Jan Beulich wrote:
> >> >>> On 08.07.15 at 19:27, wrote:
> >> > On Tue, Jun 30, 2015 at 07:33:59PM -0400,
> elena.ufimts
On Thu, Jul 09, 2015 at 09:10:06AM +0100, Jan Beulich wrote:
> >>> On 08.07.15 at 19:27, wrote:
> > On Tue, Jun 30, 2015 at 07:33:59PM -0400, elena.ufimts...@oracle.com wrote:
> >> From: Elena Ufimtseva
> >>
> >
> > You usually say why you need
From: Elena Ufimtseva
v9 of rmrr command line patches.
Add Xen command line option rmrr to specify RMRR
regions for devices that are not defined in ACPI thus
causing IO Page Fault while booting dom0 in PVH mode.
These additional regions will be added to the list of
RMRR regions parsed from ACPI
From: Elena Ufimtseva
In preparation for patch "iommu: add rmrr Xen command line option for
extra rmrrs" which will use it.
Signed-off-by: Elena Ufimtseva
---
xen/include/xen/pci.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/include/xen/pci.h b/xen/include/xen/p
From: Elena Ufimtseva
On some platforms RMRR regions may be not specified
in ACPI and thus will not be mapped 1:1 in dom0. This
causes IO Page Faults and prevents dom0 from booting
in PVH mode.
New Xen command line option rmrr allows to specify
such devices and memory regions. These regions are
From: Elena Ufimtseva
For sbdf's parsing in RMRR command line add __parse_pci with additional
parameter def_seg. __parse_pci will help to identify if segment was
found in string being parsed or default segment was used.
Make a wrapper parse_pci so the rest of the callers are not aff
From: Elena Ufimtseva
In preparation for auxiliary RMRR data provided on Xen
command line, make RMRR adding a separate function.
Also free memery for rmrr device scope in error path.
Signed-off-by: Elena Ufimtseva
---
xen/drivers/passthrough/vtd/dmar.c | 126
From: Elena Ufimtseva
Release memory allocated for scope.devices dmar units on various
failure paths and when disabling dmar. Set device count after
successful memory allocation, not before, in device scope parsing function.
Signed-off-by: Elena Ufimtseva
---
Changes in v6
On Tue, Jul 07, 2015 at 10:54:25AM +0100, Jan Beulich wrote:
> >>> On 01.07.15 at 20:30, wrote:
> > Release memory allocated for scope.devices when disabling
> > dmar units. Also set device count after memory allocation when
> > device scope parsing.
> > This is explanation of why the code should
- ian.campb...@citrix.com wrote:
> On Fri, 2015-07-03 at 13:55 +0100, Ian Campbell wrote:
> > On Thu, 2015-07-02 at 16:16 +0100, Ian Jackson wrote:
> > > Ian Campbell writes ("Re: [Xen-devel] [CALL-FOR-AGENDA] Monthly
> Xen.org Technical Call (2015-07-08)"):
> > > > On Thu, 2015-07-02 at 09:4
On Wed, Jul 1, 2015 at 10:42 AM, Dario Faggioli
wrote:
> Hey,
>
> I know Wei is away, so I'll try to find the time to look at this myself,
> but I figured I'll let know about it, in case someone has obvious (or
> not :-D) ideas.
>
> I think I'm facing a bug that prevents creating PV guests with a
From: Elena Ufimtseva
Release memory allocated for scope.devices when disabling
dmar units. Also set device count after memory allocation when
device scope parsing.
This is explanation of why the code should be moved imho and
answers Jan question about why I needed to do this.
In
On Wed, Jul 01, 2015 at 11:00:45AM +0100, Andrew Cooper wrote:
> On 01/07/15 00:20, elena.ufimts...@oracle.com wrote:
> > --- a/xen/drivers/passthrough/vtd/dmar.c
> > +++ b/xen/drivers/passthrough/vtd/dmar.c
> > @@ -81,6 +81,13 @@ static int __init acpi_register_rmrr_unit(struct
> > acpi_rmrr_unit
From: Elena Ufimtseva
v8 of rmrr comman line patches.
Add Xen command line option rmrr to specify RMRR
regions for devices that are
From: Elena Ufimtseva
On some platforms RMRR regions may be not specified
in ACPI and thus will not be mapped 1:1 in dom0. This
causes IO Page Faults and prevents dom0 from booting
in PVH mode.
New Xen command line option rmrr allows to specify
such devices and memory regions. These regions are
From: Elena Ufimtseva
In preparation for auxiliary RMRR data provided on Xen
command line, make RMRR adding a separate function.
Also free memery for rmrr device scope in error path.
I will also post additional patch with cleanups to address
other non-functional changes as
From: Elena Ufimtseva
For sbdf'si parsing in rmrr command line add __parse_pci with addtional
parameter def_seg. __parse_pci will help to identify if segment was
found
in string being parsed or default segment was used.
Make a wrapper parse_pci so the rest of the callers are not aff
From: Elena Ufimtseva
Signed-off-by: Elena Ufimtseva
---
xen/include/xen/pci.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h
index 3908146..414106a 100644
--- a/xen/include/xen/pci.h
+++ b/xen/include/xen/pci.h
@@ -33,6 +33,8 @@
#define
From: Elena Ufimtseva
Release memory allocated for scope.devices when disabling
dmar units. Also set device count after memory allocation when
device scope parsing.
This is explanation of why the code should be moved imho and
answers Jan question about why I needed to do this.
In
On Wed, Jun 24, 2015 at 02:41:54PM -0700, Mukesh Rathor wrote:
> On Wed, 24 Jun 2015 16:26:44 -0400
> Elena Ufimtseva wrote:
>
> > On Wed, Jun 24, 2015 at 07:24:18PM +0100, Andrew Cooper wrote:
> > > On 24/06/15 08:49, Jan Beulich wrote:
> > > >>>> On
On Wed, Jun 24, 2015 at 07:24:18PM +0100, Andrew Cooper wrote:
> On 24/06/15 08:49, Jan Beulich wrote:
> On 24.06.15 at 04:34, wrote:
> >> On 06/23/2015 08:30 AM, Jan Beulich wrote:
> >> On 22.06.15 at 18:37, wrote:
> --- a/xen/arch/x86/hvm/svm/svm.c
> +++ b/xen/arch/x86/hvm/sv
On Tue, Jun 23, 2015 at 01:02:49PM +0100, Jan Beulich wrote:
> >>> On 22.06.15 at 18:37, wrote:
> > From: Elena Ufimtseva
> >
> > Signed-off-by: Mukesh Rathor
>
> As long as this patch originally cam from Mukesh, From: should
> reflect that imo. On
On Tue, Jun 23, 2015 at 01:02:49PM +0100, Jan Beulich wrote:
> >>> On 22.06.15 at 18:37, wrote:
> > From: Elena Ufimtseva
> >
> > Signed-off-by: Mukesh Rathor
>
> As long as this patch originally cam from Mukesh, From: should
> reflect that imo. On
From: Elena Ufimtseva
Signed-off-by: Mukesh Rathor
---
xen/arch/x86/hvm/svm/vmcb.c | 16 +---
1 file changed, 13 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/hvm/svm/vmcb.c b/xen/arch/x86/hvm/svm/vmcb.c
index 6339d2a..70a6588 100644
--- a/xen/arch/x86/hvm/svm/vmcb.c
From: Elena Ufimtseva
PVH doesn't use apic emulation hence vlapic->regs ptr is not set for it.
Signed-off-by: Mukesh Rathor
---
xen/arch/x86/hvm/svm/svm.c | 25 ++---
1 file changed, 14 insertions(+), 11 deletions(-)
diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/
From: Elena Ufimtseva
Call pv_cpuid for pvh cpuid intercept. Note, we modify
svm_vmexit_do_cpuid instead of the intercept switch because the guest
eip needs to be adjusted for pvh also.
Signed-off-by: Mukesh Rathor
---
xen/arch/x86/hvm/svm/svm.c | 25 ++---
1 file changed
From: Elena Ufimtseva
Finally, enable pvh if the cpu supports NPT and svm decode.
Signed-off-by: Mukesh Rathor
---
xen/arch/x86/hvm/svm/svm.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c
index 64d22fe..9945550 100644
--- a/xen
From: Elena Ufimtseva
On AMD, MSR_AMD64_TSC_RATIO must be set for rdtsc instruction in guest
to properly read the cpu tsc. To that end, set tsc_khz in struct domain.
Signed-off-by: Mukesh Rathor
---
xen/arch/x86/time.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/arch/x86/time.c b
From: Elena Ufimtseva
This is a re-spin of patches for AMD PVH DomU from Mukesh Rathor.
As I am diving into more details of AMD PVH, I am reposting his series
with minor changes that reviewers (Jan and Boris) posted in comments.
The issue with handle_mmio is not yet addressed and I would like
From: Elena Ufimtseva
Certain IOIO instructions and CR access instructions like
lmsw/clts etc need to be emulated. handle_mmio is incorrectly called to
accomplish this. Create svm_emulate() to call hvm_emulate_one which is more
appropriate, and works for pvh as well. handle_mmio call is
On Fri, Jun 05, 2015 at 05:29:21PM +0100, Ian Campbell wrote:
> On Wed, 2015-06-03 at 09:35 -0400, Boris Ostrovsky wrote:
> > > What I'm hearing from the x86 maintainers is that this is actually a
> > > high priority and not a "nice to have cleanup".
> > >
> > >> I picked 32-bit support, Elena is l
From: Elena Ufimtseva
In preparation for auxiliary RMRR data provided on Xen
command line, make RMRR adding a separate function.
Also free memery for rmrr device scope in error path.
Signed-off-by: Elena Ufimtseva
---
xen/drivers/passthrough/vtd/dmar.c | 130
From: Elena Ufimtseva
From: Elena Ufimtseva
On some platforms RMRR regions may be not specified
in ACPI and thus will not be mapped 1:1 in dom0. This
causes IO Page Faults and prevents dom0 from booting
in PVH mode.
New Xen command line option rmrr allows to specify
such devices and memory
From: Elena Ufimtseva
For sbdf'si parsing in rmrr command line add __parse_pci with addtional
parameter def_seg. __parse_pci will help to identify if segment was
found
in string being parsed or default segment was used.
Make a wrapper parse_pci so the rest of the callers are not aff
From: Elena Ufimtseva
v7 of rmrr comman line patches.
Thank you for comments on v6.
Add Xen command line option rmrr to specify RMRR
regions for devices that are not defined in ACPI thus
From: Elena Ufimtseva
Signed-off-by: Elena Ufimtseva
---
xen/include/xen/pci.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h
index 3908146..414106a 100644
--- a/xen/include/xen/pci.h
+++ b/xen/include/xen/pci.h
@@ -33,6 +33,8 @@
#define
From: Elena Ufimtseva
Third attempt to incorporate memory leak fix.
Thanks for comment on v2.
Release memory allocated for scope.devices when disabling
dmar units. Also set device count after memory allocation when
device scope parsing.
Changes in v3:
- make freeing memory for scope devices
path.
> > No changes since v5.
>
> Certainly there is. (And the statement wouldn't belong here anyway,
> but below the first --- separator.)
>
> > Signed-off-by: Elena Ufimtseva
> > Reviewed-by: Jan Beulich
>
> And certainly I didn't approve it in t
On Mon, Jun 01, 2015 at 04:51:55AM +, Tian, Kevin wrote:
> > From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com]
> > Sent: Saturday, May 30, 2015 5:39 AM
> >
> > From: Elena Ufimtseva
> >
> > In preparation for auxiliary RMRR data provide
On Mon, Jun 01, 2015 at 09:45:51AM +0100, Jan Beulich wrote:
> >>> On 01.06.15 at 06:47, wrote:
> >> From: Tian, Kevin
> >> Sent: Monday, June 01, 2015 12:43 PM
> >>
> >>
> >> and looks you dropped earlier changes to acpi_parse_one_rmrr. any
> >> elaboration why it's not required in this versio
From: Elena Ufimtseva
In preparation for auxiliary RMRR data provided on Xen
command line, make RMRR adding a separate function.
Also free memery for rmrr device scope in error path.
No changes since v5.
Signed-off-by: Elena Ufimtseva
Reviewed-by: Jan Beulich
---
xen/drivers/passthrough/vtd
From: Elena Ufimtseva
On some platforms RMRR regions may be not specified
in ACPI and thus will not be mapped 1:1 in dom0. This
causes IO Page Faults and prevents dom0 from booting
in PVH mode.
New Xen command line option rmrr allows to specify
such devices and memory regions. These regions are
1 - 100 of 171 matches
Mail list logo