Re: [Xen-devel] [v7][RFC][PATCH 06/13] hvmloader/ram: check if guest memory is out of reserved device memory maps

2014-11-19 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, November 12, 2014 5:57 PM On 12.11.14 at 10:13, tiejun.c...@intel.com wrote: On 2014/11/12 17:02, Jan Beulich wrote: On 12.11.14 at 09:45, tiejun.c...@intel.com wrote: #2 flags field in each specific device of new domctl

Re: [Xen-devel] [v7][RFC][PATCH 06/13] hvmloader/ram: check if guest memory is out of reserved device memory maps

2014-11-19 Thread Tian, Kevin
From: Tian, Kevin Sent: Wednesday, November 19, 2014 4:18 PM From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, November 12, 2014 5:57 PM On 12.11.14 at 10:13, tiejun.c...@intel.com wrote: On 2014/11/12 17:02, Jan Beulich wrote: On 12.11.14 at 09:45, tiejun.c

Re: [Xen-devel] [v7][RFC][PATCH 06/13] hvmloader/ram: check if guest memory is out of reserved device memory maps

2014-11-20 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Thursday, November 20, 2014 4:04 PM On 20.11.14 at 08:45, kevin.t...@intel.com wrote: Yang and I did some discussion here. We understand your point to avoid introducing new interface if we can leverage existing code. However it's not a

Re: [Xen-devel] [v7][RFC][PATCH 06/13] hvmloader/ram: check if guest memory is out of reserved device memory maps

2014-11-20 Thread Tian, Kevin
From: Tian, Kevin Sent: Thursday, November 20, 2014 4:51 PM From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Thursday, November 20, 2014 4:04 PM On 20.11.14 at 08:45, kevin.t...@intel.com wrote: Yang and I did some discussion here. We understand your point to avoid introducing

Re: [Xen-devel] [v8][PATCH 02/17] introduce XEN_DOMCTL_set_rdm

2014-12-02 Thread Tian, Kevin
From: Chen, Tiejun Sent: Monday, December 01, 2014 5:24 PM This should be based on a new parameter globally, 'pci_rdmforce'. pci_rdmforce = 1 = Of course this should be 0 by default. '1' means we should force check to reserve all ranges. If failed VM wouldn't be created successfully.

Re: [Xen-devel] [v8][PATCH 04/17] update the existing hypercall to support XEN_DOMCTL_set_rdm

2014-12-02 Thread Tian, Kevin
From: Chen, Tiejun Sent: Monday, December 01, 2014 5:24 PM After we intend to expost that hypercall explicitly based on XEN_DOMCTL_set_rdm, we need this rebase. I hope we can squash this into that previous patch once Jan Ack this. better to merge together, since it's the right thing to do

Re: [Xen-devel] [v8][PATCH 06/17] tools/libxc: check if modules space is overlapping with reserved device memory

2014-12-02 Thread Tian, Kevin
From: Chen, Tiejun Sent: Monday, December 01, 2014 5:24 PM In case of reserved device memory overlapping with ram, it also probably overlap with modules space so we need to check these reserved device memory as well. Signed-off-by: Tiejun Chen tiejun.c...@intel.com Reviewed-by: Kevin

Re: [Xen-devel] [v8][PATCH 09/17] hvmloader/ram: check if guest memory is out of reserved device memory maps

2014-12-02 Thread Tian, Kevin
From: Chen, Tiejun Sent: Monday, December 01, 2014 5:24 PM We need to check to reserve all reserved device memory maps in e820 to avoid any potential guest memory conflict. Currently, if we can't insert RDM entries directly, we may need to handle several ranges as follows: a. Fixed

Re: [Xen-devel] [v8][PATCH 10/17] hvmloader/mem_hole_alloc: skip any overlap with reserved device memory

2014-12-02 Thread Tian, Kevin
From: Chen, Tiejun Sent: Monday, December 01, 2014 5:24 PM In some cases like igd_opregion_pgbase, guest will use mem_hole_alloc to allocate some memory to use in runtime cycle, so we alsoe need to make sure all reserved device memory don't overlap such a region. OK, seems you meant to use

Re: [Xen-devel] [v8][PATCH 11/17] xen/x86/p2m: reject populating for reserved device memory mapping

2014-12-02 Thread Tian, Kevin
From: Chen, Tiejun Sent: Monday, December 01, 2014 5:24 PM We need to reject to populate reserved device memory mapping, and then make sure all reserved device memory can't be accessed by any !iommu approach. Signed-off-by: Tiejun Chen tiejun.c...@intel.com --- xen/arch/x86/mm/p2m.c

Re: [Xen-devel] [v8][PATCH 12/17] xen/x86/ept: handle reserved device memory in ept_handle_violation

2014-12-02 Thread Tian, Kevin
From: Chen, Tiejun Sent: Monday, December 01, 2014 5:25 PM We always reserve these ranges since we never allow any stuff to poke them. But in theory some untrusted VM can maliciously access them. So we need to intercept this approach. But we just don't want to leak anything or introduce

Re: [Xen-devel] [v8][PATCH 14/17] xen/x86/p2m: introduce set_identity_p2m_entry

2014-12-02 Thread Tian, Kevin
From: Chen, Tiejun Sent: Monday, December 01, 2014 5:25 PM We will create RMRR mapping as follows: If gfn space unoccupied, we just set that. If space already occupy by 1:1 RMRR mapping do thing. Others should be failed. Signed-off-by: Tiejun Chen tiejun.c...@intel.com Reviewed-by:

Re: [Xen-devel] [v8][PATCH 15/17] xen:vtd: create RMRR mapping

2014-12-02 Thread Tian, Kevin
From: Chen, Tiejun Sent: Monday, December 01, 2014 5:25 PM intel_iommu_map_page() does nothing if VT-d shares EPT page table. So rmrr_identity_mapping() never create RMRR mapping but in some cases like some GFX drivers it still need to access RMRR. Here we will create those RMRR mappings

Re: [Xen-devel] [Intel-gfx] [Announcement] 2014-Q3 release of XenGT - a Mediated Graphics Passthrough Solution from Intel

2014-12-04 Thread Tian, Kevin
From: Fabio Fantoni [mailto:fabio.fant...@m2r.biz] Sent: Thursday, December 04, 2014 6:20 PM Il 04/12/2014 03:45, Jike Song ha scritto: Hi all, We're pleased to announce a public release to Intel Graphics Virtualization Technology (Intel GVT-g, formerly known as XenGT). Intel GVT-g

Re: [Xen-devel] [PATCH V4] Decouple SandyBridge quirk from VTd timeout

2014-12-04 Thread Tian, Kevin
From: Donald D. Dugger Sent: Friday, November 21, 2014 1:12 PM Currently the quirk code for SandyBridge uses the VTd timeout value when writing to an IGD register. This is the wrong timeout to use and, at 1000 msec., is also much too large. This patch changes the quirk code to use a

Re: [Xen-devel] [v8][PATCH 09/17] hvmloader/ram: check if guest memory is out of reserved device memory maps

2014-12-04 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Friday, December 05, 2014 12:20 AM On 01.12.14 at 10:24, tiejun.c...@intel.com wrote: We need to check to reserve all reserved device memory maps in e820 to avoid any potential guest memory conflict. Currently, if we can't insert RDM

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-09 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Tuesday, December 09, 2014 6:50 PM On 09.12.14 at 11:37, yu.c.zh...@linux.intel.com wrote: On 12/9/2014 6:19 PM, Paul Durrant wrote: I think use of an raw mfn value currently works only because dom0 is using a 1:1 IOMMU mapping

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-09 Thread Tian, Kevin
From: Tim Deegan [mailto:t...@xen.org] Sent: Tuesday, December 09, 2014 6:47 PM At 18:10 +0800 on 09 Dec (1418145055), Yu, Zhang wrote: Hi all, As you can see, we are pushing our XenGT patches to the upstream. One feature we need in xen is to translate guests' gfn to mfn in XenGT

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-09 Thread Tian, Kevin
From: Malcolm Crossley Sent: Tuesday, December 09, 2014 6:52 PM On 09/12/14 10:37, Yu, Zhang wrote: On 12/9/2014 6:19 PM, Paul Durrant wrote: I think use of an raw mfn value currently works only because dom0 is using a 1:1 IOMMU mapping scheme. Is my understanding correct, or do

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-09 Thread Tian, Kevin
From: Paul Durrant [mailto:paul.durr...@citrix.com] Sent: Tuesday, December 09, 2014 7:44 PM -Original Message- From: Ian Campbell Sent: 09 December 2014 11:29 To: Paul Durrant Cc: Tim (Xen.org); Yu, Zhang; Kevin Tian; Keir (Xen.org); jbeul...@suse.com;

Re: [Xen-devel] [PATCH v2] VMX: don't allow PVH to reach handle_mmio()

2014-12-09 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, December 08, 2014 5:13 PM PVH guests accessing I/O ports via string ops is not supported yet. Reported-by: Roger Pau Monnéroger@citrix.com Signed-off-by: Jan Beulich jbeul...@suse.com Acked-by: Kevin Tian kevin.t...@intel.com

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-10 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, December 10, 2014 4:39 PM On 10.12.14 at 02:07, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Tuesday, December 09, 2014 6:50 PM On 09.12.14 at 11:37, yu.c.zh...@linux.intel.com wrote:

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-10 Thread Tian, Kevin
From: Tian, Kevin Sent: Wednesday, December 10, 2014 4:48 PM From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, December 10, 2014 4:39 PM On 10.12.14 at 02:07, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Tuesday, December 09, 2014 6

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-10 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, December 10, 2014 5:17 PM On 10.12.14 at 09:47, kevin.t...@intel.com wrote: two translation paths in assigned case: 1. [direct CPU access from VM], with partitioned PCI aperture resource, every VM can access a portion of

Re: [Xen-devel] [v8][PATCH 04/17] update the existing hypercall to support XEN_DOMCTL_set_rdm

2014-12-10 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, December 10, 2014 5:01 PM On 10.12.14 at 04:39, kevin.t...@intel.com wrote: 1. It's more efficient for new people to start from a small, well-defined task in one area, and then spanning to adjacent areas gradually. Patience

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-10 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, December 10, 2014 6:36 PM On 10.12.14 at 02:14, kevin.t...@intel.com wrote: From: Tim Deegan [mailto:t...@xen.org] It's been suggested before that we should revive this hypercall, and I don't think it's a good idea.

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-10 Thread Tian, Kevin
From: Ian Campbell [mailto:ian.campb...@citrix.com] Sent: Wednesday, December 10, 2014 6:11 PM On Wed, 2014-12-10 at 01:48 +, Tian, Kevin wrote: I'm not familiar with Arm architecture, but based on a brief reading it's for the assigned case where the MMU is exclusive owned by a VM, so

Re: [Xen-devel] [v8][PATCH 04/17] update the existing hypercall to support XEN_DOMCTL_set_rdm

2014-12-10 Thread Tian, Kevin
From: Tim Deegan [mailto:t...@xen.org] Sent: Wednesday, December 10, 2014 7:12 PM Hi Kevin, Thanks for taking the time to work through this. At 03:39 + on 10 Dec (1418179184), Tian, Kevin wrote: 1. It's more efficient for new people to start from a small, well-defined task

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-11 Thread Tian, Kevin
From: Tim Deegan Sent: Friday, December 12, 2014 12:47 AM Hi, At 01:41 + on 11 Dec (1418258504), Tian, Kevin wrote: From: Tim Deegan [mailto:t...@xen.org] It is Xen's job to isolate VMs from each other. As part of that, Xen uses the MMU, nested paging, and IOMMUs to control

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-11 Thread Tian, Kevin
From: Tian, Kevin Sent: Friday, December 12, 2014 2:30 PM Conclusion -- That's enough rambling from me -- time to come back down to earth. While I think it's useful to think about all these things, we don't want to get carried away. :) And as I said, for some things we can

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-14 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Friday, December 12, 2014 6:54 PM On 12.12.14 at 08:24, kevin.t...@intel.com wrote: - is there existing _map_ call for this purpose per your knowledge, or a new one is required? If the latter, what's the additional logic to be

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-15 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, December 15, 2014 5:23 PM On 15.12.14 at 10:05, kevin.t...@intel.com wrote: yes, definitely host RAM is the upper limit, and what I'm concerning here is how to reserve (at boot time) or allocate (on-demand) such large PFN

Re: [Xen-devel] RMRR Fix Design for Xen

2014-12-21 Thread Tian, Kevin
I'll work out a new design proposal based on below content and previous discussions. Thanks Tiejun for your hard-working and Jan for your careful reviews so far. For below comment: Also there's clearly an alternative proposal: Drop support for sharing page tables. Your colleagues will surely

Re: [Xen-devel] [PATCH] VT-d: don't crash when PTE bits 52 and up are non-zero

2014-12-22 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Friday, December 19, 2014 7:26 PM This can (and will) be legitimately the case when sharing page tables with EPT (more of a problem before p2m_access_rwx became zero, but still possible even now when other than that is the default for a

Re: [Xen-devel] [RFC PATCH V3 10/12] xen: Introduce monitor_op domctl

2015-02-03 Thread Tian, Kevin
From: Tamas K Lengyel [mailto:tamas.leng...@zentific.com] Sent: Friday, January 30, 2015 5:47 AM In preparation for allowing for introspecting ARM and PV domains the old control interface via the hvm_op hypercall is retired. A new control mechanism is introduced via the domctl hypercall:

Re: [Xen-devel] [PATCH] Avoid needless flush cache when guest change MTRR

2015-02-03 Thread Tian, Kevin
From: Li, Liang Z Sent: Wednesday, February 04, 2015 11:28 AM Flushing cache is needed only when guest has IOMMU device, using need_iommu(d) can minimize the impact to guest with device assigned, since a guest may be hot plugged with a device thus there may be dirty cache lines before

Re: [Xen-devel] [RFC PATCH V3 09/12] x86/hvm: factor out and rename vm_event related functions into separate file

2015-02-03 Thread Tian, Kevin
From: Tamas K Lengyel [mailto:tamas.leng...@zentific.com] Sent: Friday, January 30, 2015 5:47 AM To avoid growing hvm.c these functions can be stored separately. Signed-off-by: Tamas K Lengyel tamas.leng...@zentific.com VMX changes are clearly renaming: Acked-by: Kevin Tian

Re: [Xen-devel] [PATCH] Avoid needless flush cache when guest change MTRR

2015-02-03 Thread Tian, Kevin
From: Zhang, Yang Z Sent: Wednesday, February 04, 2015 1:54 PM Tian, Kevin wrote on 2015-02-04: From: Li, Liang Z Sent: Wednesday, February 04, 2015 11:28 AM Flushing cache is needed only when guest has IOMMU device, using need_iommu(d) can minimize the impact to guest with device

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-19 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, January 19, 2015 9:52 PM On 19.01.15 at 13:23, t...@xen.org wrote: At 11:41 + on 19 Jan (1421664109), Jan Beulich wrote: On 19.01.15 at 12:33, t...@xen.org wrote: FWIW, I don't like adding hypervisor state (and even more

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-20 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Tuesday, January 20, 2015 4:43 PM On 20.01.15 at 01:52, kevin.t...@intel.com wrote: We may make a reasonable simplification to treat all RMRRs 1MB as conflicts (all real observations so far are in BIOS region). I'm not really agreeing

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-20 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Tuesday, January 20, 2015 3:29 PM On 20.01.15 at 01:45, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] The proposed new hypercall represents _only_ reserved regions. But it was said several times that making

Re: [Xen-devel] about the funtion call memory_type_changed()

2015-01-21 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, January 21, 2015 6:31 PM Yes, it's true. But I still don't understand why to do the flush_all just when iommu_enable is true. Could you explain why ? The question you raise doesn't reflect what the function does: It

Re: [Xen-devel] about the funtion call memory_type_changed()

2015-01-21 Thread Tian, Kevin
From: Li, Liang Z Sent: Thursday, January 22, 2015 12:29 PM -Original Message- From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, January 21, 2015 7:22 PM To: Li, Liang Z Cc: Andrew Cooper; Dong, Eddie; Tian, Kevin; Zhang, Yang Z; xen- de...@lists.xen.org; k

Re: [Xen-devel] [PATCH 5/5] VMX: use cached current where available

2015-01-21 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Tuesday, January 20, 2015 7:08 PM ..., yielding better code. Signed-off-by: Jan Beulich jbeul...@suse.com Acked-by: Kevin Tian kevin.t...@intel.com ___ Xen-devel mailing list

Re: [Xen-devel] [PATCH 4/5] VMX: drop VMCS *_HIGH enumerators

2015-01-21 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Tuesday, January 20, 2015 7:08 PM Most of them have been unused since the dropping of 32-bit support, and the few remaining cases are more efficiently dealt with using a generic macro (and probably things should have been done that way from

Re: [Xen-devel] [PATCH 3/5] VMX: dump further control state

2015-01-21 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Tuesday, January 20, 2015 7:07 PM A few relevant control state fields did not get dumped so far; in particular, VM_ENTRY_INSTRUCTION_LEN got printed twice (instead of also printing VM_EXIT_INSTRUCTION_LEN). Where suitable (to reduce the

Re: [Xen-devel] [PATCH 2/5] VMX: dump full host state

2015-01-21 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Tuesday, January 20, 2015 7:06 PM A few host state fields did not get dumped so far. Where suitable (to reduce the amount of output) make some of the dumping conditional upon guest settings (this isn't required for correctness as vmr()

Re: [Xen-devel] [PATCH RFC] pvh: set need_iommu early

2015-01-21 Thread Tian, Kevin
From: Elena Ufimtseva [mailto:elena.ufimts...@oracle.com] Sent: Thursday, January 22, 2015 4:53 AM need_iommu has to be set earler for dom0 pvh specific init functions. If not enabled, mmio regions are not mapped with iommu during domain construction. This was discovered when working on

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-19 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, January 19, 2015 5:33 PM On 18.01.15 at 09:58, kevin.t...@intel.com wrote: still one open to hear suggestion though, regarding to how we want to pass the reserved regions to domain builder and hvmloader (for Xen we will extend

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-15 Thread Tian, Kevin
From: George Dunlap [mailto:george.dun...@eu.citrix.com] Sent: Thursday, January 15, 2015 2:22 AM On 01/14/2015 02:42 PM, Jan Beulich wrote: On 14.01.15 at 13:29, george.dun...@eu.citrix.com wrote: On 01/14/2015 08:06 AM, Tian, Kevin wrote: We discussed earlier there are two reasons

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-15 Thread Tian, Kevin
From: George Dunlap [mailto:george.dun...@eu.citrix.com] Sent: Wednesday, January 14, 2015 8:23 PM On 01/14/2015 12:14 PM, Ian Campbell wrote: On Wed, 2015-01-14 at 06:52 +, Tian, Kevin wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, January 14, 2015 12:06 AM

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-15 Thread Tian, Kevin
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] Sent: Thursday, January 15, 2015 4:43 AM On Wed, Jan 14, 2015 at 08:13:14AM +, Tian, Kevin wrote: From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] Sent: Wednesday, January 14, 2015 12:46 AM Perhaps

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-15 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, January 14, 2015 11:08 PM On 14.01.15 at 13:17, ian.campb...@citrix.com wrote: On Wed, 2015-01-14 at 08:06 +, Tian, Kevin wrote: - RMRRs conflicting with guest BIOS in 1MB area, as an example of hard conflicts OOI

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-15 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Thursday, January 15, 2015 4:38 PM On 14.01.15 at 19:29, george.dun...@eu.citrix.com wrote: Just to be clear -- what we're talking about here is that at the do_domain_create() level (called by libxl_domain_create_new()), it will take a

Re: [Xen-devel] about the funtion call memory_type_changed()

2015-01-22 Thread Tian, Kevin
From: Li, Liang Z Sent: Friday, January 23, 2015 1:55 PM On 22.01.15 at 08:44, yang.z.zh...@intel.com wrote: Tian, Kevin wrote on 2015-01-22: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, January 21, 2015 6:31 PM Yes, it's true. But I still don't understand

Re: [Xen-devel] [PATCH 4/4] VMX: replace plain numbers

2015-01-22 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Thursday, January 22, 2015 10:01 PM ... making the code better document itself. No functional change intended. Signed-off-by: Jan Beulich jbeul...@suse.com Acked-by: Kevin Tian kevin.t...@intel.com

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-20 Thread Tian, Kevin
From: George Dunlap Sent: Tuesday, January 20, 2015 8:57 PM On Tue, Jan 20, 2015 at 12:52 AM, Tian, Kevin kevin.t...@intel.com wrote: For RMRRs in the BIOS area, libxl will already need to know where that area is (to know that it doesn't need to fit it into the MMIO hole); if we just

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-20 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Tuesday, January 20, 2015 6:49 PM On 20.01.15 at 11:38, ian.campb...@citrix.com wrote: On Tue, 2015-01-20 at 09:10 +, Jan Beulich wrote: On 20.01.15 at 09:59, kevin.t...@intel.com wrote: From: Jan Beulich

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-18 Thread Tian, Kevin
From: George Dunlap Sent: Thursday, January 15, 2015 7:45 PM If above high level flow can be agreed, then we can move forward to discuss next level detail e.g. how to pass the rmrr list cross different components. :-) I think we're definitely ready to move on. There are a bunch of

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-18 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Thursday, January 15, 2015 6:06 PM The composed reserved region list is then passed to domain builder, which tries to detect and avoid conflicts when populating guest RAM. To avoid breaking lowmem/highmem layout, we can define a

Re: [Xen-devel] PML (Page Modification Logging) design for Xen

2015-02-11 Thread Tian, Kevin
From: Kai Huang [mailto:kai.hu...@linux.intel.com] Sent: Thursday, February 12, 2015 10:39 AM PML needs to be enabled (allocate PML buffer, initialize PML index, PML base address, turn PML on VMCS, etc) for all vcpus of the domain, as PML buffer and PML index are per-vcpu, but EPT table

Re: [Xen-devel] PML (Page Modification Logging) design for Xen

2015-02-11 Thread Tian, Kevin
From: Kai Huang [mailto:kai.hu...@linux.intel.com] Sent: Thursday, February 12, 2015 2:46 PM On 02/12/2015 02:25 PM, Tian, Kevin wrote: From: Kai Huang [mailto:kai.hu...@linux.intel.com] Sent: Thursday, February 12, 2015 10:35 AM On 02/11/2015 09:13 PM, Jan Beulich wrote

Re: [Xen-devel] PML (Page Modification Logging) design for Xen

2015-02-12 Thread Tian, Kevin
From: Tim Deegan [mailto:t...@xen.org] Sent: Thursday, February 12, 2015 8:42 PM At 07:08 + on 12 Feb (1423721283), Tian, Kevin wrote: for general log dirty, ept_invalidate_emt is required because there is access permission change (dirtied page becomes rw after 1st fault, so need

Re: [Xen-devel] VM-exit instruction length and #GP fault on IN.

2015-01-26 Thread Tian, Kevin
From: Don Slutz [mailto:dsl...@verizon.com] Sent: Tuesday, January 27, 2015 4:31 AM The question is about the VM-exit instruction length field. This is accessed in xen via: __vmread(VM_EXIT_INSTRUCTION_LEN, inst_len); an example of which is in routine get_instruction_length().

Re: [Xen-devel] [PATCH RFC] p2m: p2m_mmio_direct set RW permissions

2015-01-26 Thread Tian, Kevin
From: Elena Ufimtseva [mailto:elena.ufimts...@oracle.com] Sent: Tuesday, January 27, 2015 1:31 AM On Mon, Jan 26, 2015 at 05:06:12PM +, Jan Beulich wrote: On 26.01.15 at 17:57, elena.ufimts...@oracle.com wrote: On Fri, Jan 23, 2015 at 10:50:23AM +, Jan Beulich wrote: On

Re: [Xen-devel] [PATCH RFC] p2m: p2m_mmio_direct set RW permissions

2015-01-27 Thread Tian, Kevin
From: Elena Ufimtseva [mailto:elena.ufimts...@oracle.com] Sent: Tuesday, January 27, 2015 11:06 PM On Tue, Jan 27, 2015 at 06:41:39AM +, Tian, Kevin wrote: From: Elena Ufimtseva [mailto:elena.ufimts...@oracle.com] Sent: Tuesday, January 27, 2015 1:31 AM On Mon, Jan 26, 2015

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2015-01-06 Thread Tian, Kevin
From: George Dunlap Sent: Monday, January 05, 2015 11:50 PM On Fri, Dec 12, 2014 at 6:29 AM, Tian, Kevin kevin.t...@intel.com wrote: We're not there in the current design, purely because XenGT has to be in dom0 (so it can trivially DoS Xen by rebooting the host). Can we really

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2015-01-06 Thread Tian, Kevin
From: Tim Deegan [mailto:t...@xen.org] Sent: Thursday, December 18, 2014 11:47 PM Hi, At 07:24 + on 12 Dec (1418365491), Tian, Kevin wrote: I'm afraid not. There's nothing worrying per se in a backend knowing the MFNs of the pages -- the worry is that the backend can pass

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-12 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, January 12, 2015 5:33 PM On 12.01.15 at 09:46, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Friday, January 09, 2015 6:35 PM On 09.01.15 at 11:10, kevin.t...@intel.com wrote: From: Jan

Re: [Xen-devel] summary-1 (v2) Design proposal for RMRR fix

2015-01-12 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Friday, January 09, 2015 6:46 PM On 09.01.15 at 11:26, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] On 09.01.15 at 07:57, kevin.t...@intel.com wrote: 1.1) per-device 'warn' vs. global 'warn' Both

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-12 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Friday, January 09, 2015 6:35 PM On 09.01.15 at 11:10, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Boot time device assignment is different: The question isn't whether an assigned device works, instead the

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-12 Thread Tian, Kevin
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] Sent: Saturday, January 10, 2015 4:28 AM On Thu, Jan 08, 2015 at 06:02:04PM +, George Dunlap wrote: On Thu, Jan 8, 2015 at 4:10 PM, Jan Beulich jbeul...@suse.com wrote: On 08.01.15 at 16:59, dunl...@umich.edu wrote: On

Re: [Xen-devel] summary-1 (v2) Design proposal for RMRR fix

2015-01-12 Thread Tian, Kevin
From: Ian Campbell [mailto:ian.campb...@citrix.com] Sent: Monday, January 12, 2015 9:42 PM On Fri, 2015-01-09 at 06:57 +, Tian, Kevin wrote: 3) report-sel vs. report-all One thing I'm not clear on is whether you are suggesting to reserve RMRR (either -all or -sel) for every domain

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-12 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, January 12, 2015 5:51 PM On 12.01.15 at 10:41, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, January 12, 2015 5:33 PM On 12.01.15 at 09:46, kevin.t...@intel.com wrote: From: Jan

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-12 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, January 12, 2015 7:37 PM On 12.01.15 at 12:22, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, January 12, 2015 6:23 PM One of my main problems with all you recent argumentation here is

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-12 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, January 12, 2015 8:03 PM On 12.01.15 at 12:41, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, January 12, 2015 7:37 PM On 12.01.15 at 12:22, kevin.t...@intel.com wrote: From: Jan

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-12 Thread Tian, Kevin
From: Tian, Kevin Sent: Monday, January 12, 2015 8:29 PM From: George Dunlap Sent: Monday, January 12, 2015 8:14 PM On Mon, Jan 12, 2015 at 11:22 AM, Tian, Kevin kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, January 12, 2015 6:23 PM

Re: [Xen-devel] [PATCH] xen-pt: Fix PCI devices re-attach failed

2015-01-12 Thread Tian, Kevin
From: Stefano Stabellini Sent: Monday, January 12, 2015 7:36 PM On Wed, 24 Dec 2014, Liang Li wrote: Use the 'xl pci-attach $DomU $BDF' command to attach more then one PCI devices to the guest, then detach the devices with 'xl pci-detach $DomU $BDF', after that, re-attach these PCI

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-12 Thread Tian, Kevin
From: George Dunlap Sent: Monday, January 12, 2015 8:14 PM On Mon, Jan 12, 2015 at 11:22 AM, Tian, Kevin kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, January 12, 2015 6:23 PM On 12.01.15 at 11:12, kevin.t...@intel.com wrote: From: Jan

Re: [Xen-devel] [PATCH] hvm/vmx: WRITE_MSR() macro hygene

2015-01-08 Thread Tian, Kevin
From: Andrew Cooper [mailto:andrew.coop...@citrix.com] Sent: Thursday, January 08, 2015 11:39 PM Use the standard do { } while ( 0 ) semantics, and don't hide the break statement, incase this macro wants to be used anywhere outside of a switch. No functional change, but it is now clear

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-08 Thread Tian, Kevin
From: George Dunlap Sent: Friday, January 09, 2015 12:00 AM 3.3 Policies An intuitive thought is to fail immediately upon a confliction, however it is not flexible regarding to different requirments: a) it's not appropriate to fail libxc domain builder just because such

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-08 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Thursday, January 08, 2015 8:59 PM On 08.01.15 at 13:49, george.dun...@eu.citrix.com wrote: One question: where are these RMRRs typically located in memory? Are they normally up in the MMIO region? Or can they occur anywhere (even in

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-08 Thread Tian, Kevin
From: George Dunlap Sent: Friday, January 09, 2015 2:02 AM On Thu, Jan 8, 2015 at 4:10 PM, Jan Beulich jbeul...@suse.com wrote: On 08.01.15 at 16:59, dunl...@umich.edu wrote: On Thu, Jan 8, 2015 at 1:54 PM, Jan Beulich jbeul...@suse.com wrote: the 1st invocation of this interface will

[Xen-devel] summary-1 (v2) Design proposal for RMRR fix

2015-01-08 Thread Tian, Kevin
with above major opens. will include them in next version after above high level opens are closed) Thanks Kevin From: Tian, Kevin Sent: Friday, December 26, 2014 7:23 PM (please note some proposal is different from last sent version after more discussions. But I tried to summarize previous

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2015-01-09 Thread Tian, Kevin
From: Tim Deegan [mailto:t...@xen.org] Sent: Thursday, January 08, 2015 8:43 PM Hi, Not really. The IOMMU tables are also 64-bit so there must be enough addresses to map all of RAM. There shouldn't be any need for these mappings to be _contiguous_, btw. You just need to have one

Re: [Xen-devel] summary-1 (v2) Design proposal for RMRR fix

2015-01-09 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Friday, January 09, 2015 5:46 PM On 09.01.15 at 07:57, kevin.t...@intel.com wrote: 1) 'fail' vs. 'warn' upon gfn confliction Assigning device which fails RMRR confliction check (i.e. intended gfns already allocated for other

Re: [Xen-devel] [PATCH v4 for 4.5] x86/VPMU: Clear last_vcpu when destroying VPMU

2015-01-07 Thread Tian, Kevin
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] Sent: Tuesday, January 06, 2015 12:33 AM On Thu, Dec 18, 2014 at 01:06:40PM -0500, Boris Ostrovsky wrote: We need to make sure that last_vcpu is not pointing to VCPU whose VPMU is being destroyed. Otherwise we may try to

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-13 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, January 14, 2015 12:06 AM On 13.01.15 at 17:00, george.dun...@eu.citrix.com wrote: Another option I was thinking about: Before assigning a device to a guest, you have to unplug the device and assign it to pci-back (e.g.,

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-14 Thread Tian, Kevin
From: George Dunlap [mailto:george.dun...@eu.citrix.com] Sent: Tuesday, January 13, 2015 11:59 PM On 01/13/2015 03:52 PM, Jan Beulich wrote: On 13.01.15 at 13:03, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Tuesday, January 13, 2015 7:56 PM On

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-14 Thread Tian, Kevin
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] Sent: Wednesday, January 14, 2015 12:46 AM Perhaps an easier way of this is to use the existing mechanism we have - that is the XENMEM_memory_map (which BTW e820_host uses). If all of this is done in the libxl (which already

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-13 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Tuesday, January 13, 2015 7:56 PM On 13.01.15 at 12:03, kevin.t...@intel.com wrote: Then I hope you understand now about our discussion in libxl/xen/ hvmloader, based on the fact that conflict may not be avoided. That's the major open

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-09 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Friday, January 09, 2015 5:21 PM On 09.01.15 at 03:27, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Thursday, January 08, 2015 9:55 PM On 26.12.14 at 12:23, kevin.t...@intel.com wrote: 3)

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-08 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Thursday, January 08, 2015 9:55 PM On 26.12.14 at 12:23, kevin.t...@intel.com wrote: [Issue-2] Being lacking of goal-b), existing device assignment with RMRR works only when reserved regions happen to not conflicting with other valid

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-08 Thread Tian, Kevin
+ on 26 Dec (1419589382), Tian, Kevin wrote: c) in Xen hypervisor it is reasonable to fail upon confliction, where device is actually assigned. But due to the same requirement on USB controller, sometimes we might want it succeed just w/ warnings. Can you explain more concretely why we

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-08 Thread Tian, Kevin
From: George Dunlap Sent: Thursday, January 08, 2015 8:55 PM On Thu, Jan 8, 2015 at 12:49 PM, George Dunlap george.dun...@eu.citrix.com wrote: If RMRRs almost always happen up above 2G, for example, then a simple solution that wouldn't require too much work would be to make sure that

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-08 Thread Tian, Kevin
From: George Dunlap Sent: Thursday, January 08, 2015 8:50 PM On Fri, Dec 26, 2014 at 11:23 AM, Tian, Kevin kevin.t...@intel.com wrote: (please note some proposal is different from last sent version after more discussions. But I tried to summarize previous discussions and explained why

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-14 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, January 14, 2015 6:24 PM On 14.01.15 at 10:43, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, January 14, 2015 5:00 PM On 14.01.15 at 09:06, kevin.t...@intel.com wrote: Now

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-14 Thread Tian, Kevin
From: George Dunlap [mailto:george.dun...@eu.citrix.com] Sent: Wednesday, January 14, 2015 8:02 PM On 01/14/2015 10:24 AM, Jan Beulich wrote: On 14.01.15 at 10:43, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, January 14, 2015 5:00 PM On

Re: [Xen-devel] PML (Page Modification Logging) design for Xen

2015-02-11 Thread Tian, Kevin
From: Kai Huang [mailto:kai.hu...@linux.intel.com] Sent: Thursday, February 12, 2015 10:35 AM On 02/11/2015 09:13 PM, Jan Beulich wrote: On 11.02.15 at 12:52, andrew.coop...@citrix.com wrote: On 11/02/15 08:28, Kai Huang wrote: With PML, we don't have to use write protection but just

Re: [Xen-devel] [PATCH] VT-d: don't crash when PTE bits 52 and up are non-zero

2015-01-07 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, January 07, 2015 6:16 PM On 23.12.14 at 07:52, kevin.t...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Friday, December 19, 2014 7:26 PM This can (and will) be legitimately the case when sharing

  1   2   3   4   5   6   7   8   9   >