[Xen-devel] [PATCH] MAINTAINERS: change the vt-d maintainer

2015-11-22 Thread Zhang, Yang Z
add Feng as the new maintainer of VT-d stuff Signed-off-by: Yang Zhang --- MAINTAINERS |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/MAINTAINERS b/MAINTAINERS index 759de1b..eb48f77 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -193,8 +193,8

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-11-09 Thread Zhang, Yang Z
Liuqiming (John) wrote on 2015-10-10: > > On 2015/10/10 14:32, Zhang, Yang Z wrote: >> Zhang, Yang Z wrote on 2015-09-24: >>> Liuqiming (John) wrote on 2015-09-24: >>>> >>>> On 2015/9/24 11:25, Zhang, Yang Z wrote: >>>> it completed,

Re: [Xen-devel] Question about XEN Hypervisor MSR capability exposion to VMs

2015-11-01 Thread Zhang, Yang Z
Liuyingdong wrote on 2015-10-31: > Hi All > > We encountered a blue screen problem when live migrate > Win8.1/Win2012R2 64bit VM from V3 processor to non-V3 processor > sandbox, KVM does not has this problem. > > After looking into the MSR capabilities, we found XEN hypervisor > exposed bit 39

Re: [Xen-devel] [Patch RFC 00/13] VT-d Asynchronous Device-TLB Flush for ATS Device

2015-10-15 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-10-15: On 15.10.15 at 03:03, wrote: >> Jan Beulich wrote on 2015-10-14: >>> As long as the multi-millisecond spins aren't going to go away by >>> other means, I think conversion to async mode is ultimately unavoidable. >> >> I am not fully

Re: [Xen-devel] [Patch RFC 00/13] VT-d Asynchronous Device-TLB Flush for ATS Device

2015-10-15 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-10-15: On 15.10.15 at 10:52, wrote: >> Jan Beulich wrote on 2015-10-15: >> On 15.10.15 at 09:28, wrote: The premise for a misbehaving guest to impact the system is that the IOMMU is buggy which takes

Re: [Xen-devel] [Patch RFC 00/13] VT-d Asynchronous Device-TLB Flush for ATS Device

2015-10-15 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-10-15: On 15.10.15 at 09:28, wrote: >> Jan Beulich wrote on 2015-10-15: >> On 15.10.15 at 03:03, wrote: Jan Beulich wrote on 2015-10-14: > As long as the multi-millisecond spins aren't going to go away by

Re: [Xen-devel] [Patch RFC 00/13] VT-d Asynchronous Device-TLB Flush for ATS Device

2015-10-14 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-10-14: On 14.10.15 at 07:12, wrote: >> Jan Beulich wrote on 2015-10-13: >> On 13.10.15 at 07:27, wrote: Jan Beulich wrote on 2015-10-12: On 12.10.15 at 03:42, wrote: >>

Re: [Xen-devel] [Patch RFC 00/13] VT-d Asynchronous Device-TLB Flush for ATS Device

2015-10-13 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-10-13: On 13.10.15 at 07:27, wrote: >> Jan Beulich wrote on 2015-10-12: >> On 12.10.15 at 03:42, wrote: So, my suggestion is that we can rely on user to not assign the ATS device if hypervisor says it

Re: [Xen-devel] [PATCH 2/2] VT-d: section placement and type adjustments

2015-10-13 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-10-13: On 13.10.15 at 07:28, wrote: >> Acked-by: Yang Zhang > > Thanks. What about patch 1? Done! I think I have acked it. But seems I forget to do it. Best regards, Yang

Re: [Xen-devel] [PATCH 1/2] VT-d: use proper error codes in iommu_enable_x2apic_IR()

2015-10-13 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-09-29: > ... allowing to suppress a confusing messeage combination: When > ACPI_DMAR_X2APIC_OPT_OUT is set, so far we first logged a message that > IR could not be enabled (hence not using x2APIC), followed by one > indicating successful initialization of IR (if no

Re: [Xen-devel] [PATCH 2/2] VT-d: section placement and type adjustments

2015-10-12 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-10-12: On 10.10.15 at 08:30, wrote: >> Jan Beulich wrote on 2015-09-29: >>> --- a/xen/drivers/passthrough/vtd/intremap.c >>> +++ b/xen/drivers/passthrough/vtd/intremap.c >>> @@ -143,7 +143,7 @@ static void set_hpet_source_id(unsigned >>>

Re: [Xen-devel] [Patch RFC 00/13] VT-d Asynchronous Device-TLB Flush for ATS Device

2015-10-12 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-10-12: On 12.10.15 at 03:42, wrote: >> According the discussion and suggestion you made in past several >> weeks, obviously, it is not an easy task. So I am wondering whether >> it is worth to do it since: >> 1. ATS device is not popular. I

Re: [Xen-devel] [Patch RFC 00/13] VT-d Asynchronous Device-TLB Flush for ATS Device

2015-10-11 Thread Zhang, Yang Z
Xu, Quan wrote on 2015-09-16: > Introduction > > >VT-d code currently has a number of cases where completion of > certain operations is being waited for by way of spinning. The > majority of instances use that variable indirectly through > IOMMU_WAIT_OP() macro , allowing for

Re: [Xen-devel] [PATCH 2/2] VT-d: section placement and type adjustments

2015-10-10 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-09-29: > With x2APIC requiring iommu_supports_eim() to return true, we can > adjust a few conditonals such that both it and > platform_supports_x2apic() can be marked __init. For the latter as > well as for platform_supports_intremap() also change the return types > to

Re: [Xen-devel] [PATCH] VT-d: don't suppress invalidation address write when it is zero

2015-10-09 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-09-28: > GFN zero is a valid address, and hence may need invalidation done for > it just like for any other GFN. > > Signed-off-by: Jan Beulich Acked-by: Yang Zhang > --- > The comment right before the respective

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-09-24 Thread Zhang, Yang Z
Liuqiming (John) wrote on 2015-09-24: > > > On 2015/9/24 11:25, Zhang, Yang Z wrote: >> Liuqiming (John) wrote on 2015-09-24: >>> On 2015/9/23 21:41, Zhang, Yang Z wrote: >>>> Hanweidong (Randy) wrote on 2015-09-23: >>>>> Zhang, Yang Z wrote

Re: [Xen-devel] [PATCH] vt-d: Fix IM bit mask and unmask of Fault Event Control Register.

2015-09-24 Thread Zhang, Yang Z
Xu, Quan wrote on 2015-09-25: > Signed-off-by: Quan Xu Though the patch is simple, the necessary description still is required, like: Bit 0:29 in Fault Event Control Register are " Reserved and Preserved", software cannot write 0 to it unconditionally. Software must preserve

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-09-23 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-09-23: On 23.09.15 at 11:15, wrote: >> Jan Beulich wrote on 2015-09-23: >> On 23.09.15 at 05:50, wrote: --- a/xen/arch/x86/hvm/vmx/vmx.c +++ b/xen/arch/x86/hvm/vmx/vmx.c @@ -1678,8 +1678,9 @@ static

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-09-23 Thread Zhang, Yang Z
Hanweidong (Randy) wrote on 2015-09-23: > > > Zhang, Yang Z wrote on ent: 2015年9月23日 11:51: >> VCPU_KICK_SOFTIRQ when post interrupt to vm. >> >> Zhang, Yang Z wrote on 2015-09-08: >>> Liuqiming (John) wrote on 2015-09-08: >>>> Ok, I will tr

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-09-23 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-09-23: On 23.09.15 at 05:50, wrote: >> --- a/xen/arch/x86/hvm/vmx/vmx.c >> +++ b/xen/arch/x86/hvm/vmx/vmx.c >> @@ -1678,8 +1678,9 @@ static void __vmx_deliver_posted_interrupt(struct > vcpu *v) >> { >> unsigned int cpu =

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-09-23 Thread Zhang, Yang Z
George Dunlap wrote on 2015-09-23: > On Wed, Sep 23, 2015 at 8:42 AM, Jan Beulich wrote: > On 23.09.15 at 05:50, wrote: >>> --- a/xen/arch/x86/hvm/vmx/vmx.c >>> +++ b/xen/arch/x86/hvm/vmx/vmx.c >>> @@ -1678,8 +1678,9 @@ static void >

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-09-23 Thread Zhang, Yang Z
Liuqiming (John) wrote on 2015-09-24: > On 2015/9/23 21:41, Zhang, Yang Z wrote: >> Hanweidong (Randy) wrote on 2015-09-23: >>> >>> Zhang, Yang Z wrote on ent: 2015年9月23日 11:51: >>>> VCPU_KICK_SOFTIRQ when post interrupt to vm. >>>> >>&g

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-09-22 Thread Zhang, Yang Z
Zhang, Yang Z wrote on 2015-09-08: > Liuqiming (John) wrote on 2015-09-08: >> Ok, I will try to explain, correct me if I got anything wrong: >> >> The problem here is not interrupts lost but interrupts not delivered >> in time. >> >> there are basically

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-09-18 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-09-18: >>>> "Zhang, Yang Z" <yang.z.zh...@intel.com> 09/18/15 2:29 AM >>> >> Zhang, Yang Z wrote on 2015-09-08: >> I have a quick check on current code. I am curious that is current Xen >> preemptive? >> >

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-09-18 Thread Zhang, Yang Z
Andrew Cooper wrote on 2015-09-18: > On 18/09/15 12:40, Zhang, Yang Z wrote: >> Jan Beulich wrote on 2015-09-18: >>>>>> "Zhang, Yang Z" <yang.z.zh...@intel.com> 09/18/15 2:29 AM >>> >>>> Zhang, Yang Z wrote on 2015-09-08: >>

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-09-17 Thread Zhang, Yang Z
Zhang, Yang Z wrote on 2015-09-08: > Liuqiming (John) wrote on 2015-09-08: >> Ok, I will try to explain, correct me if I got anything wrong: >> >> The problem here is not interrupts lost but interrupts not delivered >> in time. >> >> there are basically

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-09-08 Thread Zhang, Yang Z
Liuqiming (John) wrote on 2015-09-08: > Ok, I will try to explain, correct me if I got anything wrong: > > The problem here is not interrupts lost but interrupts not delivered in > time. > > there are basically two path to inject an interrupt into VM (or vCPU to > another vCPU): > Path 1, the

Re: [Xen-devel] [PATCH v6 15/18] vmx: Properly handle notification event when vCPU is running

2015-09-07 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-09-07: >> + * jnz .Lvmx_process_softirqs >> + * >> + * .. >> + * >> + * je .Lvmx_launch >> + * >> + * .. >> + * >> + * .Lvmx_process_softirqs: >> + * sti >> + * call do_softirq >> +

Re: [Xen-devel] [PATCH] Remove a set operation for VCPU_KICK_SOFTIRQ when post interrupt to vm.

2015-09-07 Thread Zhang, Yang Z
Hanweidong (Randy) wrote on 2015-09-08: > > Jan Beulich wrote on ent: 2015年9月7日 22:46: >> Subject: Re: [Xen-devel] [PATCH] Remove a set operation for >> VCPU_KICK_SOFTIRQ when post interrupt to vm. >> > On 07.09.15 at 16:24, wrote: >>> I believe this also has

Re: [Xen-devel] [PATCH v6 15/18] vmx: Properly handle notification event when vCPU is running

2015-09-07 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-09-07: On 07.09.15 at 15:00, wrote: >> Jan Beulich wrote on 2015-09-07: >>> Yang, in this context: Why does __vmx_deliver_posted_interrupt() >>> not use cpu_raise_softirq(), instead kind of open coding it (see your >>> d7dafa375b ["VMX: Add

Re: [Xen-devel] [PATCH v6] dmar: device scope mem leak fix

2015-07-15 Thread Zhang, Yang Z
elena.ufimts...@oracle.com wrote on 2015-07-07: From: Elena Ufimtseva elena.ufimts...@oracle.com Release memory allocated for scope.devices dmar units on various failure paths and when disabling dmar. Set device count after successful memory allocation, not before, in device scope parsing

Re: [Xen-devel] performace issue when turn on apicv

2015-06-18 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-06-18: On 18.06.15 at 10:20, jbeul...@suse.com wrote: Apart from that I notice that the EXIT_REASON_EOI_INDUCED handling also adds about the same number of ticks... Are there any other devices in the guest causing meaningful amounts of interrupts (I suppose the SSD

Re: [Xen-devel] performace issue when turn on apicv

2015-06-18 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-06-18: On 18.06.15 at 10:53, yang.z.zh...@intel.com wrote: Jan Beulich wrote on 2015-06-18: On 18.06.15 at 10:20, jbeul...@suse.com wrote: Apart from that I notice that the EXIT_REASON_EOI_INDUCED handling also adds about the same number of ticks... Are there any

Re: [Xen-devel] FW: VT-d async invalidation for Device-TLB.

2015-06-16 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-06-16: On 16.06.15 at 05:07, yang.z.zh...@intel.com wrote: Jan Beulich wrote on 2015-06-15: On 13.06.15 at 16:44, quan...@intel.com wrote: On 12.06.15 at 14:47, jbeul...@suse.com wrote: On 12.06.15 at 04:40, quan...@intel.com wrote: I tested it by a Myri-10G

Re: [Xen-devel] FW: VT-d async invalidation for Device-TLB.

2015-06-15 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-06-15: On 13.06.15 at 16:44, quan...@intel.com wrote: On 12.06.15 at 14:47, jbeul...@suse.com wrote: On 12.06.15 at 04:40, quan...@intel.com wrote: On 10.06.15 at 16:05, jbeul...@suse.com wrote: On 03.06.15 at 09:49, quan...@intel.com wrote: For Context

Re: [Xen-devel] performace issue when turn on apicv

2015-06-11 Thread Zhang, Yang Z
Liuqiming (John) wrote on 2015-06-11: Hi, Recently I encounter a strange performance problem with APIC virtualization. My host has Intel(R) Xeon(R) CPU E7-4890 v2 CPU installed which support APIC virtualization and x2apic, and there are 4 socket * 15 cores_per_socket = 60 core available

Re: [Xen-devel] win7 stuck on boot occasionally when apicv enabled

2015-06-11 Thread Zhang, Yang Z
Sunguodong wrote on 2015-06-03: Hi, I am getting a vm stuck problem when booting a windows 7 guest on xen-4.6(latest version). My hvm guest: Windows 7 64bit (installed pvdriver inside, pvdriver is downloaded from 'http://wiki.univention.de/index.php?title=Installing-signed-GPLPV-dri

Re: [Xen-devel] performace issue when turn on apicv

2015-06-11 Thread Zhang, Yang Z
is not caused by apicv itself, maybe some other logic has conflict with apicv. On 2015/6/11 15:35, Zhang, Yang Z wrote: Liuqiming (John) wrote on 2015-06-11: Hi, Recently I encounter a strange performance problem with APIC virtualization. My host has Intel(R) Xeon(R) CPU E7-4890 v2 CPU

Re: [Xen-devel] [PATCH] IOMMU/x86: avoid pages without GFN in page table creation/updating

2015-05-11 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-05-11: On 11.05.15 at 04:53, yang.z.zh...@intel.com wrote: Jan Beulich wrote on 2015-05-07: --- a/xen/drivers/passthrough/x86/iommu.c +++ b/xen/drivers/passthrough/x86/iommu.c @@ -59,10 +59,17 @@ int arch_iommu_populate_page_table(struc if (

Re: [Xen-devel] [PATCH] IOMMU/x86: avoid pages without GFN in page table creation/updating

2015-05-10 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-05-07: Handing INVALID_GFN to functions like hd-platform_ops-map_page() just can't do any good, and the ioreq server code results in such pages being on the list of ones owned by a guest. While - as suggested by Tim - we should use get_gfn()/put_gfn() there to

Re: [Xen-devel] FreeBSD Dom0 IOMMU issues

2015-05-06 Thread Zhang, Yang Z
Michael Dexter wrote on 2015-05-07: Hello all, I have been working with Roger Pau Monné to bring FreeBSD Dom0 support to a production-ready state but we appear to have hit an IOMMU issue. Hardware: Lenovo ThinkPad T420 i7-2640M CPU @ 2.80GHz with 16GB RAM. I am attaching my console

Re: [Xen-devel] [PATCH 2/3] xen/vt-d: mask interrupt message generation

2015-05-04 Thread Zhang, Yang Z
Chen, Tiejun wrote on 2015-05-04: Yang, Thanks for your review. On 2015/5/4 12:07, Zhang, Yang Z wrote: Chen, Tiejun wrote on 2015-05-04: While initializing VT-D we should mask interrupt message generation to avoid receiving any interrupt as pending before enable DMA translation

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-04 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-05-04: On 04.05.15 at 11:14, andrew.coop...@citrix.com wrote: On 04/05/2015 09:52, Jan Beulich wrote: On 04.05.15 at 04:16, tiejun.c...@intel.com wrote: --- a/xen/drivers/passthrough/vtd/x86/vtd.c +++ b/xen/drivers/passthrough/vtd/x86/vtd.c @@ -56,7 +56,9 @@

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-03 Thread Zhang, Yang Z
Chen, Tiejun wrote on 2015-05-04: clflush is a light weight but not serializing instruction, so hence memory fence is necessary to make sure all load/store visible before flush cache line. Signed-off-by: Tiejun Chen tiejun.c...@intel.com Acked-by: Yang Zhang yang.z.zh...@intel.com ---

Re: [Xen-devel] [PATCH 2/3] xen/vt-d: mask interrupt message generation

2015-05-03 Thread Zhang, Yang Z
Chen, Tiejun wrote on 2015-05-04: While initializing VT-D we should mask interrupt message generation to avoid receiving any interrupt as pending before enable DMA translation, and also mask that before disable DMA engine. Signed-off-by: Tiejun Chen tiejun.c...@intel.com ---

Re: [Xen-devel] Network blocked after sending several packets larger than 128 bytes when using Driver Domain

2015-04-01 Thread Zhang, Yang Z
openlui wrote on 2015-03-28: Hi, all: I have done the same testing on hosts which support Intel VT-d Shared EPT tables today, the results show that similar problem still exists under xen 4.5 release: 1. When we boot xen with iommu=1, no-sharept argument which will disable Intel

Re: [Xen-devel] [RFC v1 12/15] vmx: Properly handle notification event when vCPU is running

2015-03-26 Thread Zhang, Yang Z
Wu, Feng wrote on 2015-03-27: Zhang, Yang Z wrote on 2015-03-25: when vCPU is running Wu, Feng wrote on 2015-03-25: When a vCPU is running in Root mode and a notification event has been injected to it. we need to set VCPU_KICK_SOFTIRQ for the current cpu, so the pending interrupt

Re: [Xen-devel] [PATCH] VT-d: improve fault info logging

2015-03-26 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-03-26: I got repeatedly annoyed by there not getting anything logged by default on VT-d faults (and hence having to tell people to add extra command line options), and hence I think it is time to redo this code: Log basic fault information at guest-warning level

Re: [Xen-devel] [RFC v1 12/15] vmx: Properly handle notification event when vCPU is running

2015-03-25 Thread Zhang, Yang Z
Wu, Feng wrote on 2015-03-25: When a vCPU is running in Root mode and a notification event has been injected to it. we need to set VCPU_KICK_SOFTIRQ for the current cpu, so the pending interrupt in PIRR will be synced to vIRR before VM-Exit in time. Shouldn't the pending interrupt be synced

Re: [Xen-devel] (v2) VT-d Posted-interrupt (PI) design for XEN

2015-03-18 Thread Zhang, Yang Z
Konrad Rzeszutek Wilk wrote on 2015-03-19: On Wed, Mar 18, 2015 at 12:44:21PM +, Wu, Feng wrote: VT-d Posted-interrupt (PI) design for XEN Background == With the development of virtualization, there are more and more device assignment requirements. However, today when a VM is

Re: [Xen-devel] [PATCH] Avoid needless flush cache when guest change MTRR

2015-02-03 Thread Zhang, Yang Z
Tian, Kevin wrote on 2015-02-04: From: Li, Liang Z Sent: Wednesday, February 04, 2015 11:28 AM Flushing cache is needed only when guest has IOMMU device, using need_iommu(d) can minimize the impact to guest with device assigned, since a guest may be hot plugged with a device thus there may

Re: [Xen-devel] about the funtion call memory_type_changed()

2015-01-21 Thread Zhang, Yang Z
Tian, Kevin wrote on 2015-01-22: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, January 21, 2015 6:31 PM Yes, it's true. But I still don't understand why to do the flush_all just when iommu_enable is true. Could you explain why ? The question you raise doesn't reflect

Re: [Xen-devel] dom0 as pvh boot problem

2015-01-05 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-01-05: Elena Ufimtseva ufimts...@gmail.com 01/02/15 7:32 PM The last successful command is the reading status register of second IOMMU unit: snip from iommu_enable_translation() in ./xen/drivers/passthrough/vtd/iommu.c 746:sts = dmar_readl(iommu-reg,

Re: [Xen-devel] [PATCH for 4.6 07/13] xen: Introduce a generic way to describe device

2014-12-17 Thread Zhang, Yang Z
Julien Grall wrote on 2014-12-17: diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h index 5f295f3..6ace79d 100644 --- a/xen/include/xen/pci.h +++ b/xen/include/xen/pci.h @@ -13,6 +13,7 @@ #include xen/irq.h #include xen/pci_regs.h #include xen/pfn.h +#include xen/device.h

Re: [Xen-devel] [v4] libxc: Expose the 1GB pages cpuid flag to guest

2014-12-03 Thread Zhang, Yang Z
Konrad Rzeszutek Wilk wrote on 2014-12-03: On Wed, Dec 03, 2014 at 09:38:49AM +, Ian Campbell wrote: On Tue, 2014-12-02 at 16:09 -0500, Konrad Rzeszutek Wilk wrote: On Fri, Nov 28, 2014 at 11:50:43AM +, Ian Campbell wrote: On Fri, 2014-11-28 at 18:52 +0800, Liang Li wrote: If hardware

Re: [Xen-devel] [PATCH] libxc: Expose the pdpe1gb cpuid flag to guest

2014-11-24 Thread Zhang, Yang Z
Tim Deegan wrote on 2014-11-19: At 01:29 + on 19 Nov (1416356943), Zhang, Yang Z wrote: Tim Deegan wrote on 2014-11-18: In this case, the guest is entitled to _expect_ pagefaults on 1GB mappings if CPUID claims they are not supported. That sounds like an unlikely thing for the guest

Re: [Xen-devel] [PATCH] libxc: Expose the pdpe1gb cpuid flag to guest

2014-11-18 Thread Zhang, Yang Z
Tim Deegan wrote on 2014-11-18: At 14:26 + on 18 Nov (1416317209), Ian Campbell wrote: On Tue, 2014-11-18 at 11:41 +, Zhang, Yang Z wrote: Hmm - this is a pitfall waiting to happen. In the case that there is a heterogeneous setup with one 1G capable and one 1G incapable server, Xen