Re: [PATCH] x86/efi: Add necessary checks before iterating over efi.memmap

2016-09-19 Thread Chao Gao
Sorry for bothering you. There is a regression since commit 78ce248f that if booting xen in UEFI mode, dom0 will crash and xen reboot constantly. This patch tries to fix it. Please take a look at it. On Tue, Sep 13, 2016 at 11:28:15AM +0800, Chao Gao wrote: >Commit 78ce248f (efi: Iterate o

Re: [PATCH] xen: xen-pciback: Reset MSI-X state when exposing a device

2018-12-11 Thread Chao Gao
On Wed, Dec 05, 2018 at 09:01:33AM -0500, Boris Ostrovsky wrote: >On 12/5/18 4:32 AM, Roger Pau Monné wrote: >> On Wed, Dec 05, 2018 at 10:19:17AM +0800, Chao Gao wrote: >>> I find some pass-thru devices don't work any more across guest reboot. >>> Assigning it to a

Re: [PATCH] xen: xen-pciback: Reset MSI-X state when exposing a device

2018-12-12 Thread Chao Gao
On Wed, Dec 12, 2018 at 01:51:01AM -0700, Jan Beulich wrote: >>>> On 12.12.18 at 08:06, wrote: >> On Wed, Dec 05, 2018 at 09:01:33AM -0500, Boris Ostrovsky wrote: >>>On 12/5/18 4:32 AM, Roger Pau Monné wrote: >>>> On Wed, Dec 05, 2018 at 10:19:17AM +0800,

Re: [PATCH] xen: xen-pciback: Reset MSI-X state when exposing a device

2018-12-12 Thread Chao Gao
Ostrovsky wrote: >>>>>On 12/5/18 4:32 AM, Roger Pau Monné wrote: >>>>>> On Wed, Dec 05, 2018 at 10:19:17AM +0800, Chao Gao wrote: >>>>>>> I find some pass-thru devices don't work any more across guest reboot. >>>>>>> A

Re: [PATCH] xen: xen-pciback: Reset MSI-X state when exposing a device

2018-12-13 Thread Chao Gao
Jan Beulich wrote: >>>>>>>> On 12.12.18 at 08:06, wrote: >>>>>> On Wed, Dec 05, 2018 at 09:01:33AM -0500, Boris Ostrovsky wrote: >>>>>>>On 12/5/18 4:32 AM, Roger Pau Monné wrote: >>>>>>>> On Wed, Dec 05, 2018 at 10:19

Re: [PATCH] xen: xen-pciback: Reset MSI-X state when exposing a device

2019-09-13 Thread Chao Gao
On Fri, Sep 13, 2019 at 10:02:24AM +, Spassov, Stanislav wrote: >On Thu, Dec 13, 2018 at 07:54, Chao Gao wrote: >>On Thu, Dec 13, 2018 at 12:54:52AM -0700, Jan Beulich wrote: >>>>>> On 13.12.18 at 04:46, wrote: >>>> On Wed, Dec 12, 2018 at 08:21:39A

Re: [RESEND PATCH V8 05/11] KVM: Create architecture independent ROE skeleton

2019-01-21 Thread Chao Gao
On Mon, Jan 21, 2019 at 01:39:34AM +0200, Ahmed Abd El Mawgood wrote: >This patch introduces a hypercall that can assist against subset of kernel >rootkits, it works by place readonly protection in shadow PTE. The end >result protection is also kept in a bitmap for each kvm_memory_slot and is >used

[PATCH] x86/kvm/vmx: Don't halt vcpu when L1 is injecting events to L2

2018-02-07 Thread Chao Gao
t delivery may wake L2 vcpu, if VID is enabled, do the same thing -- don't halt L2. Signed-off-by: Chao Gao --- arch/x86/kvm/vmx.c | 10 -- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index bb5b488..e1fe4e4 100644 --- a/arc

Re: [PATCH] x86/kvm/vmx: Don't halt vcpu when L1 is injecting events to L2

2018-02-08 Thread Chao Gao
On Thu, Feb 08, 2018 at 11:29:49AM +0100, Paolo Bonzini wrote: >On 08/02/2018 06:13, Chao Gao wrote: >> Although L2 is in halt state, it will be in the active state after >> VM entry if the VM entry is vectoring. Halting the vcpu here means >> the event won't be inject

Re: [PATCH] x86/kvm/vmx: Don't halt vcpu when L1 is injecting events to L2

2018-02-08 Thread Chao Gao
On Thu, Feb 08, 2018 at 04:09:36AM -0800, Liran Alon wrote: > >- pbonz...@redhat.com wrote: > >> On 08/02/2018 06:13, Chao Gao wrote: >> > Although L2 is in halt state, it will be in the active state after >> > VM entry if the VM entry is vectoring. Halting t

[PATCH v2] x86/kvm/vmx: Don't halt vcpu when L1 is injecting events to L2

2018-02-08 Thread Chao Gao
njected to L2. Cc: Liran Alon Signed-off-by: Chao Gao --- Changes in v2: - Remove VID stuff. Only handle event injection in this patch. --- arch/x86/kvm/vmx.c | 7 ++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index bb5b488..42f3

[PATCH v3] KVM: VMX: Don't halt vcpu when L1 is injecting events to L2

2018-02-10 Thread Chao Gao
njected to L2. Cc: Liran Alon Signed-off-by: Chao Gao --- changes in v3: - s/VECTORING_INFO_VALID_MASK/INTR_INFO_VALID_MASK - Changes of subject, comments. Changes in v2: - Remove VID stuff. Only handle event injection in this patch. Signed-off-by: Chao Gao --- arch/x86/kvm/vmx.c | 7 +

[PATCH] sched: correct a typo

2016-10-20 Thread Chao Gao
correct a typo. Signed-off-by: Chao Gao --- kernel/sched/core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/sched/core.c b/kernel/sched/core.c index 94732d1..02f8f9a 100644 --- a/kernel/sched/core.c +++ b/kernel/sched/core.c @@ -6976,7 +6976,7 @@ struct