[Xen-ia64-devel] Enabling hypercalls from VT-i domain

2006-08-02 Thread DOI Tsunehisa
Hi all, My name is Tsunehisa Doi. We are porting Steven Smith's para drivers for full-VM to IPF. In the xen-unstable.hg (cs: 10883-10885), it's enabling the hypercall from HVM domain. Thus, I will post the enabling patch for IPF. This patch includes: + cleanup the hypercall handling code

Re: [Xen-ia64-devel] Enabling hypercalls from VT-i domain

2006-08-02 Thread Doi . Tsunehisa
Hi Tristan, Thank you for your comment. You (Tristan.Gingold) said: Le Mercredi 02 Aot 2006 12:34, DOI Tsunehisa a crit : Hi all, My name is Tsunehisa Doi. We are porting Steven Smith's para drivers for full-VM to IPF. In the xen-unstable.hg (cs: 10883-10885), it's enabling

Re: [Xen-ia64-devel] Enabling hypercalls from VT-i domain

2006-08-02 Thread DOI Tsunehisa
Hi all, I modified the code using VMX_DOMAIN macro. Thanks, -- Tsunehisa Doi [EMAIL PROTECTED] wrote: Hi Tristan, Thank you for your comment. You (Tristan.Gingold) said: Le Mercredi 02 Aot 2006 12:34, DOI Tsunehisa a crit : Hi all, My name is Tsunehisa Doi. We are porting

[Xen-ia64-devel] catch up new hypercall HYPERVISR_hvm_op for IPF

2006-08-07 Thread DOI Tsunehisa
Hi all, We are porting Steven Smith's para drivers for full-VM to IPF. In the xen-unstable.hg: * cs:10911-10912: + implement new hypercall called HYPERVISOR_hvm_op. + the hypercall has new feature about set/get params. We want to catch up this common feature. Thus I'll post the

Re: [Xen-ia64-devel] catch up new hypercall HYPERVISR_hvm_op for IPF

2006-08-07 Thread Doi . Tsunehisa
Hi, Thank you for your comment. You (Tristan.Gingold) said: I'd prefer do_hvm_op to be in xen/ and not in vmx/. All the hypercalls are there. In x86 code, do_hvm_op is implemented in hvm/hvm.c, thus we have implemented in vmx/. And we will implement IPF specific feature to port

Re: [Xen-ia64-devel] catch up new hypercall HYPERVISR_hvm_op for IPF

2006-08-07 Thread DOI Tsunehisa
Hi, [EMAIL PROTECTED] wrote: Sorry!! I refered old version of x86 code. Currently, it modified. I will correct, soon. I modified it. Thanks, - Tsunehisa Doi # HG changeset patch # User [EMAIL PROTECTED] # Node ID 39feb5061f88cefe00548879459c01e547bc9eec # Parent

Re: [Xen-ia64-devel] Catch up for PV_on_HVM

2006-08-20 Thread Doi . Tsunehisa
Hi, You (alex.williamson) said: On Fri, 2006-08-18 at 21:45 +0900, DOI Tsunehisa wrote: We want to catch up this common feature. We don't complete to catch up, yet. But I'll post patches which we wrote already. This patch includes: * catch up `hvm_op fixup' - This patch

[Xen-ia64-devel] Catch up for PV_on_HVM (cont..)

2006-08-22 Thread DOI Tsunehisa
Hi all, I will post patches for catching up the remain features for PV-on-HVM. * need to catchup for IPF + 02.ioemu_xen_evtchns.diff:applied (cs:10974-10976) *not yet* - Flip the device model over to using the new Xen event channels + 04.hvm_inter.diff:applied

Re: [Xen-ia64-devel] PV-on-HVM driver for IPF

2006-08-24 Thread Doi . Tsunehisa
Hi Tristan, Thank you for your comment. You (Tristan.Gingold) said: I will post patches of PV-on-HVM for IPF. We wrote the patch under this consideration: * Expand hvm_op hypercall + Introduce HVMOP_setup_shared_info_page - A page allocated on HVM-guest OS is swapped

Re: [Xen-ia64-devel] PV-on-HVM driver for IPF

2006-08-24 Thread DOI Tsunehisa
Hi, I'll post a new xen-hyper.patch2, whitch is modified about parameter checking. [EMAIL PROTECTED] wrote: Hi Tristan, Thank you for your comment. You (Tristan.Gingold) said: I will post patches of PV-on-HVM for IPF. We wrote the patch under this consideration: * Expand

Re: [Xen-ia64-devel] PV-on-HVM driver for IPF

2006-08-25 Thread Doi . Tsunehisa
Hi, You (Tristan.Gingold) said: I will post patches of PV-on-HVM for IPF. We wrote the patch under this consideration: * Expand hvm_op hypercall + Introduce HVMOP_setup_shared_info_page - A page allocated on HVM-guest OS is swapped original shared_info page with this

Re: [Xen-ia64-devel] PV-on-HVM driver for IPF

2006-08-25 Thread DOI Tsunehisa
I'll post new xen-hyper.patch3 whitch was modified. Thanks, -- Tsunehisa Doi [EMAIL PROTECTED] wrote: +if (likely(IS_XEN_HEAP_FRAME(virt_to_page(pgaddr { +free_domheap_page(virt_to_page(pgaddr)); +free_xenheap_page((void *)pgaddr); +

Re: [Xen-ia64-devel] PV-on-HVM driver for IPF

2006-08-25 Thread DOI Tsunehisa
Sorry, I didn't cleanup about indent. I'll repost new xen-hyper.patch4. Thanks, -- Tsunehisa Doi DOI Tsunehisa wrote: I'll post new xen-hyper.patch3 whitch was modified. Thanks, -- Tsunehisa Doi [EMAIL PROTECTED] wrote: +if (likely(IS_XEN_HEAP_FRAME(virt_to_page

[Xen-ia64-devel] Re: [Xen-devel] Porting PV-on-HVM for ia64 platform

2006-08-26 Thread Doi . Tsunehisa
Hi all, Sorry, I have tried to repost it, but my mail tool reformated with format which I don't want. I (Doi.Tsunehisa) said: Tsunehisa Doi wrote: Hi all, My name is Tsunehisa Doi. We have been porting PV-on-HVM feature for ia64 platform. Sorry, This message is difficult to read.

[Xen-ia64-devel] Re: [Xen-devel] Porting PV-on-HVM for ia64 platform

2006-08-26 Thread Doi . Tsunehisa
I (Doi.Tsunehisa) said: You (Keir.Fraser) said: On 26/8/06 6:50 am, Tsunehisa Doi [EMAIL PROTECTED] wrote: - In x86 code, original shared_info page is used after pv-on-hvm setup with remapping feature in arch depend HYPERVISOR_memory_op. But, we can't implement same feature for IPF, thus we

Re: [Xen-ia64-devel] PV-on-HVM driver for IPF

2006-08-27 Thread Doi . Tsunehisa
Hi, You (alex.williamson) said: On Sat, 2006-08-26 at 14:45 +0900, $Be.d9(B wrote: -/* Copy existing grant table shared into new page */ +/* Copy existing grant table new page */ if (o_grant_shared) { memcpy((void *)d-grant_table-shared, (void

Re: [Xen-ia64-devel] PV-on-HVM driver for IPF

2006-08-27 Thread DOI Tsunehisa
[EMAIL PROTECTED] wrote: You (alex.williamson) said: On Sat, 2006-08-26 at 14:45 +0900, 絎箙 wrote: -/* Copy existing grant table shared into new page */ +/* Copy existing grant table new page */ if (o_grant_shared) { memcpy((void *)d-grant_table-shared,

Re: [Xen-ia64-devel] PV-on-HVM driver for IPF

2006-08-28 Thread DOI Tsunehisa
Alex Williamson wrote: On Mon, 2006-08-28 at 08:35 +0900, [EMAIL PROTECTED] wrote: In PV-on-HVM driver code, is_running_on_xen and HYPERVISOR_ioremap have to be used as valid feature. Thus we modified like this. Doesn't the below do what you need w/o breaking the CONFIG_XEN=n build?

Re: [Xen-ia64-devel] Catch up for PV_on_HVM (cont..)

2006-08-29 Thread Doi . Tsunehisa
Hi Anthony, Thank you for your comment. You (anthony.xu) said: I noticed that you use do_yield instead of do_block in xen-event.patch. I think do_yield will incur some unnecessary schedule before it can resume to Guest. Is this comment about vmx_send_assist_req() ? So, it sets

[Xen-ia64-devel] Re: [Xen-devel] Porting PV-on-HVM for ia64 platform

2006-08-29 Thread DOI Tsunehisa
Hi, [EMAIL PROTECTED] wrote: Currently, we are trying to modify PV-on-HVM feature for IPF with the same method of x86 code. And in preliminary implement, we could do the feature. I will post patches for PV-on-HVM on ia64 platform. These patches modify common code for PV-on-HVM on IPF.

[Xen-ia64-devel] PV-on-HVM for IPF (take 3)

2006-08-29 Thread DOI Tsunehisa
Hi all, We have been porting PV-on-HVM feature for ia64 platform. I will post patches for PV-on-HVM on ia64 platform. These patches modify common code for PV-on-HVM on IPF. We ported PV-on-HVM for IPF under this consideration: * Expand memory_op hypercall + Introduce

Re: [Xen-ia64-devel] PV-on-HVM for IPF (take 3)

2006-08-29 Thread Doi . Tsunehisa
Hi Tristan, Thank you for your comment. You (Tristan.Gingold) said: I have a question about this modification: void vcpu_flush_vtlb_all(struct vcpu *v) { - /* First VCPU tlb. */ - vcpu_purge_tr_entry(PSCBX(v,dtlb)); - vcpu_purge_tr_entry(PSCBX(v,itlb)); - - /*

Re: [Xen-ia64-devel] PV-on-HVM for IPF (take 3)

2006-08-29 Thread DOI Tsunehisa
You should add least add a comment because it is unusable to see VMX_DOMAIN() within paravirtualization area. OK. I'll append comment to descibe more detail reason. I'll post new expand-memory-op.patch2. Thanks, - Tsunehisa Doi Expand memory_op for PV-on-HVM on IPF Signed-off-by:

Re: [Xen-ia64-devel] PV-on-HVM for IPF (take 3)

2006-09-03 Thread Doi . Tsunehisa
Hi Alex, You (alex.williamson) said: I'll post new expand-memory-op.patch2. I applied this, but I did have to fix mm.h to make it build. Thanks, Thank you, and sorry. I forgot to append mm.h patch with expand-memory-op.patch2. -- ÅÚÈî¤Ç¤·¤¿¡¥¡¥¡¥

[Xen-ia64-devel] Cleanup for PV-on-HVM for IPF

2006-09-04 Thread DOI Tsunehisa
Hi all, I will post patche for PV-on-HVM on ia64 platform to cleanup for common code modification minimized. These patch include: * cleanup.patch - ia64_xenmem_reservation_op() and is_running_on_xen() are macro-nize if CONFIG_VMX_GUEST is defined. - xen_machphys_update()

Re: [Xen-ia64-devel] Cleanup for PV-on-HVM for IPF

2006-09-04 Thread DOI Tsunehisa
Hi, Thank you for your comment. Alex Williamson wrote: On Mon, 2006-09-04 at 16:57 +0900, DOI Tsunehisa wrote: #include xen/interface/memory.h +#ifdef CONFIG_VMX_GUEST +# define ia64_xenmem_reservation_op(op, xmr) (0) +#else /* CONFIG_VMX_GUEST */ int ia64_xenmem_reservation_op

[Xen-ia64-devel] Re: [Xen-devel] please pull xen-ia64-unstable.hg

2006-09-12 Thread DOI Tsunehisa
Hi, Alex Williamson wrote: This includes a fairly small number of changesets that I'd like to get in before 3.0.3. Changes include: finishing the PV-on-HVM driver support for ia64, fix an error when an FPSWA interface is not installed, add a few EFI calls to support hwclock, add some more

Re: [Xen-ia64-devel] PV-on-HVM for IPF (take 3)

2006-09-12 Thread Doi . Tsunehisa
Hi. You (yamahata) said: Your patch isn't SMP-safe. domVTi code assumes that the p2m table is build at the domain creation and read-only after that. However your patch breaks the assumption and opened the door to SMP world. Especially you must resolve the race between tlb insert and tlb

Re: [Xen-ia64-devel] Cleanup for PV-on-HVM for IPF

2006-09-21 Thread Doi . Tsunehisa
Hi Alex, Please import xen-unstable.hg(cs:11464:3bff5c5b9206) for enabling PV-on-HVM for IPF. changeset: 11464:3bff5c5b9206 user:[EMAIL PROTECTED] date:Wed Sep 13 14:34:34 2006 +0100 summary: Fix unmodified drivers for PV-on-HVM on IA64. Thanks, - Tsunehisa

[Xen-ia64-devel] Patch for PV-on-HVM for IPF

2006-09-27 Thread DOI Tsunehisa
Hi all, Currently, we are testing PV-on-HVM driver for IPF. so, we found a problem that hypervisor crashes during VT-i domain destruction with PV-on-HVM driver. The procedure to reproduce this problem are: * Create a VT-i domain. [dom0]# xm create -f hvm.conf * Insert modules for

Re: [Xen-ia64-devel] Patch for PV-on-HVM for IPF

2006-09-27 Thread DOI Tsunehisa
Sorry, I forgot to attach the patch. DOI Tsunehisa wrote: Hi all, Currently, we are testing PV-on-HVM driver for IPF. so, we found a problem that hypervisor crashes during VT-i domain destruction with PV-on-HVM driver. The procedure to reproduce this problem are: * Create a VT

Re: [Xen-ia64-devel] Patch for PV-on-HVM for IPF

2006-09-27 Thread Doi . Tsunehisa
You (yamahata) said: On Wed, Sep 27, 2006 at 06:44:27PM +0900, DOI Tsunehisa wrote: - In x86 code, p2m table invalidation is delayed at last phase of domain destruction. = but we don't like it. it seems that p2m table exists after memory relinquised. What's

Re: [Xen-ia64-devel] Patch for PV-on-HVM for IPF

2006-09-27 Thread Doi . Tsunehisa
You (yamahata) said: - In x86 code, p2m table invalidation is delayed at last phase of domain destruction. = but we don't like it. it seems that p2m table exists after memory relinquised. What's the problem? I don't see why. In x86 code, it checks ownership of

[Xen-ia64-devel] Bind event channel of VT-i domain to vcpu 0

2006-10-02 Thread DOI Tsunehisa
Hi all, In x86 code, it was fixed about PV-on-HVM event channel in xen-unstable.hg(cs:11698). I fixed with same logic in IPF code. * bind-evtchn.patch + bind event channels of VT-i domain to vcpu 0. I tested that PV-on-HVM works. Thanks, - Tsunehisa Doi # HG changeset patch #

Re: [Xen-ia64-devel] [PATCH] xencomm_privcmd_sched_op

2006-10-04 Thread Doi . Tsunehisa
Hi Tristan, You (Tristan.Gingold) said: Tristan seems to have forgotten to implement xencomm_privcmd_sched_op(). When I tried to reboot a VTI domain, I got the dom0's message privcmd_hypercall: unknown hcall (29) and couldn't reboot. Thank you for filling the holes. I may have forgotten

Re: [Xen-ia64-devel] [PATCH] xencomm_privcmd_sched_op

2006-10-05 Thread Doi . Tsunehisa
Hi Tristan, You (Tristan.Gingold) said: Do you want me to implement them ? Yes, I hope to I've attached the log of compiling PV-on-HVM driver, and my modification for compiling them. Hi, here is my patch. xen_vnif seems to work. Can you try and confirm ? Have you ever

Re: [Xen-ia64-devel] Patch for PV-on-HVM for IPF

2006-10-10 Thread Doi . Tsunehisa
on it? Sorry, I could not spend to investigate this issue in last few weeks. Could you help me ? Thanks, - Doi Tsunehisa ___ Xen-ia64-devel mailing list Xen-ia64-devel@lists.xensource.com http://lists.xensource.com/xen-ia64-devel

Re: [Xen-ia64-devel] Patch for PV-on-HVM for IPF

2006-10-10 Thread Doi . Tsunehisa
You (yamahata) said: Although I haven't dug into its details, I want to check my suspicion. The relinquishing mm code assumes that there's no racy reference. So your patch seems too easy and not-SMP-safe to me. For example, mm-pgd isn't protected. What do you think? You are right.

Re: [Xen-ia64-devel] Patch for PV-on-HVM for IPF

2006-10-13 Thread Doi . Tsunehisa
You (yamahata) said: It might take a while for you to fix it. Can you add comments to mark them until fix? e.g. XXX not-SMP-safe. Sorry. I can't spend for the issue, now. Could you add them ? Thanks, - Tsunehisa Doi ___ Xen-ia64-devel mailing

[Xen-ia64-devel] Please try PV-on-HVM on IPF

2006-10-16 Thread DOI Tsunehisa
Hi all, We've ported PV-on-HVM drivers for IPF. But I think that only few tries it. Thus, I try to describe to use it. And I attach several patches about PV-on-HVM. + fix-warning.patch - warning fix for HVM PV driver + notsafe-comment.patch - add not-SMP-safe comment

Re: [Xen-ia64-devel] Please try PV-on-HVM on IPF

2006-10-17 Thread Doi . Tsunehisa
Hi all, I (Doi.Tsunehisa) said: We've ported PV-on-HVM drivers for IPF. But I think that only few tries it. Thus, I try to describe to use it. And I attach several patches about PV-on-HVM. + fix-warning.patch - warning fix for HVM PV driver + notsafe-comment.patch

Re: [Xen-ia64-devel] Please try PV-on-HVM on IPF

2006-10-17 Thread Doi . Tsunehisa
Sorry, I forgot to write about my test environment. I tested with xen-ia64-unstable.hg (cs:11810). I (Doi.Tsunehisa) said: Hi all, I (Doi.Tsunehisa) said: We've ported PV-on-HVM drivers for IPF. But I think that only few tries it. Thus, I try to describe to use it. And I

Re: [Xen-ia64-devel] Please try PV-on-HVM on IPF

2006-10-17 Thread Doi . Tsunehisa
Hi Tristan, Thank you for your comment. You (Tristan.Gingold) said: [linux-2.6.16.29 on VT-i domain] # cat /proc/iomem -0009 : System RAM 000a-000b : reserved 000c-000f : reserved 0010-03ff : System RAM 0400-04bf3fff : System RAM

Re: [Xen-ia64-devel] BUG at mm.c:605

2006-10-17 Thread Doi . Tsunehisa
Hi, You (yamahata) said: I think the issue is same as reported in the below thread. http://lists.xensource.com/archives/html/xen-ia64-devel/2006-09/msg00204.html I tried to convince him, but failed. I think that the best way is to revert the patch and we should seek for the right fix. I

Re: [Xen-ia64-devel] BUG at mm.c:605

2006-10-18 Thread DOI Tsunehisa
Hi Alex, Alex Williamson wrote: I think the issue is same as reported in the below thread. http://lists.xensource.com/archives/html/xen-ia64-devel/2006-09/msg00204.html I tried to convince him, but failed. I think that the best way is to revert the patch and we should seek for the right fix.

Re: [Xen-ia64-devel] Please try PV-on-HVM on IPF

2006-10-18 Thread Doi . Tsunehisa
at: xenwatch_thread+0x1e0/0x3a0 [xenbus] Best Regards, Yongkang (Kangkang) [EMAIL PROTECTED](B -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of DOI Tsunehisa Sent: 2006$BDj(B10$BTB(B16$BHU(B 20:31 To: xen-ia64-devel Subject

Re: [Xen-ia64-devel] Please try PV-on-HVM on IPF

2006-10-18 Thread Doi . Tsunehisa
You (yongkang.you) said: Does it output this trace back message when you detach vnif with xm network-detach command ? No. I didn't use above command to detach vnif. Usually I used following ways to enable vnif NIC. 1. create VTI with vif = [ '' ] 2. After VTI boot up, insert 3 related PV

Re: [Xen-ia64-devel] Please try PV-on-HVM on IPF

2006-10-18 Thread Doi . Tsunehisa
You (Tristan.Gingold) said: On RHEL4 U2 kernel (Linux version 2.6.9-22.EL), xen-platform-pci includes `PCI Bus :00', but it should be the leaf node, I think. To insmod xen-platform-pci, this iomem space was conflicted with the inner device, thus it can't be attached. At least RHEL4 U2

Re: [Xen-ia64-devel] BUG at mm.c:605

2006-10-19 Thread DOI Tsunehisa
Hi Alex, Alex Williamson wrote: Ok, should I simply revert xen-ia64-unstable cset 11636:3470d9cd27e5? Basically, yes. But we can't avoid hypervisor crash during domain destruction. I think to modify above patch to remove VT-i domain checker like attaced patch, until we will success

Re: [Xen-ia64-devel] Thanks!

2006-10-19 Thread Doi . Tsunehisa
Hi Tristan, Thank you for many advices and suggestion. I've been fortunate to have good time to work with you. You (Tristan.Gingold) said: Hi, before leaving Bull I'd like to thanks everyone. Thanks to HP for initiating Xen/ia64 and managing the project in a very democratic way.

[Xen-ia64-devel] Re: [Xen-devel][PATCH][RESEND] PV drivers for HVM guests

2006-10-26 Thread Doi . Tsunehisa
Hi Ian, You (Ian.Campbell) said: I'd much prefer it if we can find a way to avoid encoding specific RHEL kernel versions as you had in your patch. I've gone with #define gfp_t unsigned which basically ignores any existing typedef. I think this is OK in this instance since gfp_t has

Re: [Xen-ia64-devel] Modify to introduce delayed p2m table destruction

2006-11-02 Thread Doi . Tsunehisa
You (yamahata) said: Some comments. - Probably IA64 specific code paths assume that if the p2m conversion gives valid mfn, then the page isn't free. Your patch breaks it. I haven't check it though. In our investigation, the domain is paused at domain_kill phase, thus it don't occur the

Re: [Xen-ia64-devel] Modify to introduce delayed p2m table destruction

2006-11-05 Thread Doi . Tsunehisa
Hi, You (yamahata) said: - Probably IA64 specific code paths assume that if the p2m conversion gives valid mfn, then the page isn't free. Your patch breaks it. I haven't check it though. In our investigation, the domain is paused at domain_kill phase, thus it don't occur the issue,

Re: [Xen-ia64-devel] Modify to introduce delayed p2m table destruction

2006-11-05 Thread Doi . Tsunehisa
You (yamahata) said: I think, the p2m table of the domain (during destruction indeed) is not modified by any domain. Gran table reference has a possiblity of p2m table modified by other domain, but in this case, grant table reference releases before `shadow_teardown'. Grant table page

Re: [Xen-ia64-devel] Modify to introduce delayed p2m table destruction

2006-11-05 Thread Doi . Tsunehisa
You (yamahata) said: Hmm, I've thought that gnttab_release_mapping() ensures it... No. gnttab_release_mapping() is for a domain which maps a page granted by another domain. Not for a domain which grants page mapping. Ok. I understood it. However during shadow_teardown_xxx() in your

Re: [Xen-ia64-devel] Modify to introduce delayed p2m table destruction

2006-11-06 Thread Doi . Tsunehisa
Thank you for your suggestion. We'll study it. Thanks, - Tsunehisa Doi You (yamahata) said: However during shadow_teardown_xxx() in your patch other domain might access the p2m table and struct page_info. Page reference convension must be kept right during them. Yes, it might

Re: [Xen-ia64-devel] [IPF-xenU] xm destroy xenU may make xen0 crash

2006-11-23 Thread Doi . Tsunehisa
Hi, It's a temporary solution to avoid hypervisor crash... We can avoid to crash hypervisor with `xm network-detach' command. Before the domain destruction, you should detach all VNIF of the domain with `xm network-detach domid nifid' command, if you want to avoid crash hypervisor. Thanks,

Re: [Xen-ia64-devel][PATCH]Change to new interrupt deliver mechanism

2006-12-01 Thread Doi . Tsunehisa
Hi Anthony, You (anthony.xu) said: Due to we are using pci irq(15) for platform_pci, We may need to revert back this patch(Issue about interrupt for PV-on-HVM on IPF). Sorry, please tell me about the change. Actually, what will GSI for platform_pci become ? Thanks, - Tsunehisa Doi

Re: [Xen-ia64-devel][PATCH]Change to new interrupt deliver mechanism

2006-12-01 Thread Doi . Tsunehisa
Due to we are using pci irq(15) for platform_pci, We may need to revert back this patch(Issue about interrupt for PV-on-HVM on IPF). Sorry, please tell me about the change. Actually, what will GSI for platform_pci become ? It becomes 28. $B!!(BThanks... Hmm.. I'll have to

Re: [Xen-ia64-devel][PATCH]Change to new interrupt deliver mechanism

2006-12-01 Thread Doi . Tsunehisa
You (anthony.xu) said: [EMAIL PROTECTED] write on 2006$BG/(B12$B7n(B1$BF|(B 17:53: Due to we are using pci irq(15) for platform_pci, We may need to revert back this patch(Issue about interrupt for PV-on-HVM on IPF). Sorry, please tell me about the change. Actually, what

Re: [Xen-ia64-devel][PATCH]Change to new interrupt deliver mechanism

2006-12-04 Thread Doi . Tsunehisa
Hi, I (Doi.Tsunehisa) said: Hmm.. Current implement needs the GSI for platform-pci to follow status of virtual IOSAPIC in hypervisor side. But, it's not certain value from virtual IOSAPIC at calling set_callback_irq hypercall. I'll be thinking more... I've investigated it, but I

Re: [Xen-ia64-devel][PATCH]Change to new interrupt deliver mechanism

2006-12-05 Thread Doi . Tsunehisa
Hi Anthony, You (anthony.xu) said: * Hypervisor becomes to be able to use both GSI and Vector for callback irq. - For example, if it is normal value, HV accepts it as GSI. If it is value which is set MSB, HV accepts it as Vector. * If hypervisor gets Vector as callback irq,

Re: [Xen-ia64-devel][PATCH]Change to new interrupt deliver mechanism

2006-12-05 Thread Doi . Tsunehisa
Hi Anthony, Thank you for your comment. You (anthony.xu) said: Hardware IRQ is equal to GSI, but the IRQ in IPF-linux world is abstruct value not GSI. So we need to get GSI for platform-pci from IPF-linux world's IRQ. But I didn't find it. * Hypervisor becomes to be able to use both

Re: [Xen-ia64-devel][PATCH]Change to new interrupt deliver mechanism

2006-12-05 Thread Doi . Tsunehisa
Hi Anthony, You (anthony.xu) said: We had implemented older PV-on-HVM with the method like this. But, we found the issue that interrupt was injected during interrupt masking of VIOSAPIC. So we changed to implement it. In this time, we have to implement it that interrupt injection

Re: [Xen-ia64-devel][PATCH]Change to new interrupt deliver mechanism

2006-12-06 Thread Doi . Tsunehisa
You (anthony.xu) said: BTW, in my experience, the vector doesn't set to VIOSAPIC at HVMOP_set_param hypercall. Thus I'll implement to find the GSI at interrupt injection phase. In this case, Can we call set_callback_irq with hardware irq inside Qemu rather than platform_pci, just after

Re: [Xen-ia64-devel][PATCH]Change to new interrupt deliver mechanism

2006-12-06 Thread Doi . Tsunehisa
Hi Anthony, You (anthony.xu) said: Sorry, I don't know this issue for detail. I think that the guest OS sets interrupt mask register of VIOSAPIC until setting own vector. I assume that the guest OS might change the vector for such hardware in active state. Hi Doi, This issue is from

Re: [Xen-ia64-devel][PATCH]Change to new interrupt deliver mechanism

2006-12-06 Thread Doi . Tsunehisa
Hi Anthony, This issue is from you, guest linux uses vector, while there is no function like vector_to_irq. Sorry, I might misunderstand your comment. I've been thinking more about your comment. We may be able to call set_callback_irq inside qemu, but I don't think that it's good

Re: [Xen-ia64-devel][PATCH]Change to new interrupt deliver mechanism

2006-12-06 Thread Doi . Tsunehisa
Hi Anthony, You (anthony.xu) said: Do you meen that we have to modify qemu code to solve this isssue ? Doi, I think it's a clean way to handle both windows and linux guest in IPF side. And it is a very little modification in Qemu. But maybe IA32 can not use this method, because there

[Xen-ia64-devel] [Patch] Follow new interrupt deliver mechanism for PV-on-HVM/IPF

2006-12-19 Thread DOI Tsunehisa
Hi all, I modified to follow new interrupt deliver mechanism for PV-on-HVM/IPF. New interrupt deliver mechanism changed GSI of pseudo hardware for PV-on-HVM. So, old get_callback_irq function can't get GSI of it. In this case, I modified that PV-driver notices Requester-ID(RID) to hypervisor

Re: [Xen-ia64-devel] [Patch] Follow new interrupt deliver mechanism for PV-on-HVM/IPF

2006-12-19 Thread Doi . Tsunehisa
Hi Alex, Thank you for your comment. You (alex.williamson) said: +return rid | (1 31); /* with RID marker(MSB) */ Ok, except (1 31) needs to be defined in a common header somewhere so it's not just a random magic bit. Thanks, I agree it. I think that the definition should

Re: [Xen-ia64-devel] [Patch] Follow new interrupt deliver mechanism for PV-on-HVM/IPF

2006-12-19 Thread Doi . Tsunehisa
You (alex.williamson) said: I think that the definition should be in xen/include/public/hvm/params.h or xen/include/public/arch-ia64.h. What do you think about this ? It's ia64 specific, so arch-ia64.h seems more appropriate. Thank you for your advice. I'll modify the code with

Re: [Xen-ia64-devel] [Patch] Follow new interrupt deliver mechanism for PV-on-HVM/IPF

2006-12-19 Thread DOI Tsunehisa
Hi Alex, [EMAIL PROTECTED] wrote: You (alex.williamson) said: I think that the definition should be in xen/include/public/hvm/params.h or xen/include/public/arch-ia64.h. What do you think about this ? It's ia64 specific, so arch-ia64.h seems more appropriate. Thank you for your

Re: [Xen-ia64-devel][PATCH] Optimize hypercall path in VTI domain

2007-01-31 Thread Doi . Tsunehisa
You (anthony.xu) said: Hi Doi-san I know you are working on PV-ON-HVM, Applying both attatchments can make VBD work on VTI-domain on Cset 13465, I didn't try VNIF. In case we are doing the duplicated thing. Hi Anthony-san, Thank you!! I'll try it. BTW, in x86 code, the spec of

Re: [Xen-ia64-devel][PATCH] Optimize hypercall path in VTI domain

2007-02-04 Thread Doi . Tsunehisa
Hi Anthony-san, Thank you for your information. We'll try with latest changeset (cs:13837). You (anthony.xu) said: Hi Doi-san, I think you should try Cs13774 or latest Cset, The patch of Optimize hypercall path in VTI domain was checked in at Cs 13774. And this patch is a must for

Re: [Xen-ia64-devel][PATCH] Optimize hypercall path in VTI domain

2007-02-04 Thread Doi . Tsunehisa
Hi Anthony-san, I've checked it latest changeset (cs:13837). VNIF is available with the patch. I'll submit the patch and following patch. Thanks, - Tsunehisa Doi I (Doi.Tsunehisa) said: Hi Anthony-san, Thank you for your information. We'll try with latest changeset

[Xen-ia64-devel] [Patch] Modify for compiling PV-on-HVM and following callback_via

2007-02-04 Thread DOI Tsunehisa
Hi all, I modified to fix for compiling PV-on-HVM driver on IPF, and follow to allow PV-on-HVM callback irq to be identified by PCI device. In x86 code, callback irq spec was appended few weeks ago. The purpose of appended spec was same with that we had introduced using RID for callback irq.

Re: [Xen-ia64-devel] [Patch] Modify for compiling PV-on-HVM and following callback_via

2007-02-05 Thread Doi . Tsunehisa
Hi Alex, You (alex.williamson) said: --- a/xen/include/public/arch-ia64.hMon Feb 05 13:19:10 2007 +0900 +++ b/xen/include/public/arch-ia64.hMon Feb 05 13:20:48 2007 +0900 @@ -64,9 +64,11 @@ DEFINE_XEN_GUEST_HANDLE(xen_pfn_t); #define VIRQ_MCA_CMCVIRQ_ARCH_1 /* MCA cmc interrupt

Re: [Xen-ia64-devel] [Patch] Modify for compiling PV-on-HVM and following callback_via

2007-02-05 Thread DOI Tsunehisa
Hi Alex, Alex Williamson wrote: IMHO, if it's #if 0'd out, it's not really adding to backwards compatibility anyway. This wasn't in 3.0.4, so I think we should probably drop it. Thanks, I agree. I've modified the patch. Thanks, - Tsunehisa Doi # HG changeset patch # User [EMAIL

Re: [Xen-ia64-devel] [Patch] Fix for compiling PV-on-HVM on IPF

2007-02-26 Thread Doi . Tsunehisa
- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of DOI Tsunehisa Sent: 2007$BDj(B2$BTB(B27$BHU(B 7:34 To: xen-ia64-devel Subject: [Xen-ia64-devel] [Patch] Fix for compiling PV-on-HVM on IPF Hi all, In the latest ia64-unstable tree, we can't build PV-on-HVM

Re: [Xen-ia64-devel] [Patch] Fix for compiling PV-on-HVM on IPF

2007-02-26 Thread Doi . Tsunehisa
- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of DOI Tsunehisa Sent: 2007$BDj(B2$BTB(B27$BHU(B 7:34 To: xen-ia64-devel Subject: [Xen-ia64-devel] [Patch] Fix for compiling PV-on-HVM on IPF Hi all, In the latest ia64-unstable tree, we can't build

[Xen-ia64-devel] [Patch] Fix for re-enabling PV-on-HVM on IPF

2007-03-06 Thread DOI Tsunehisa
Hi all, In last week, I submitted the patch to fix for compiling PV-on-HVM. But, it crashed hypervisor, so.. I (Doi.Tsunehisa) said: We'll have to modify the arch_memory_op code to follow dynamic grant table size feature in the hypervisor side. I've be investigating this issue, thus I

Re: [Xen-ia64-devel] [Patch] Fix for re-enabling PV-on-HVM on IPF

2007-03-06 Thread Doi . Tsunehisa
Hi Yamahata-san, Thank you for your comment. You (yamahata) said: On Tue, Mar 06, 2007 at 09:56:14PM +0900, DOI Tsunehisa wrote: - we have to modify guest_physmap_add_page() to support it. (this is straight reason of hypervisor crash) The patch breaks the the p2m/m2p table

Re: [Xen-ia64-devel] [Patch] Fix for re-enabling PV-on-HVM on IPF

2007-03-06 Thread Doi . Tsunehisa
You (yamahata) said: Currently, without this patch, hypervisor crashes in PV-on-HVM initialization phase.. * at share_info page remapping: success - called from HYPERVISOR_memory_op in init_xen_info().. (unmodified_drivers/linux-2.6/platform-pci/platform-pci.c) * at grant

Re: [Xen-ia64-devel] [Patch] Fix for re-enabling PV-on-HVM on IPF

2007-03-06 Thread Doi . Tsunehisa
Hi Yamahata-san, I (Doi.Tsunehisa) said: And, I've tracked the counter, so it be cleared below: [xen/arch/ia64/xen/mm.c] long arch_memory_op(int op, XEN_GUEST_HANDLE(void) arg) { /* Unmap from old location, if any. */ gpfn = get_gpfn_from_mfn(mfn);

Re: [Xen-ia64-devel] [Patch] Fix for re-enabling PV-on-HVM on IPF

2007-03-07 Thread DOI Tsunehisa
Subject: Re: [Patch] Fix for re-enabling PV-on-HVM on IPF Hi all, I've modified the paches according to Yamahata-san's suggestion. * pvfix.patch - fix for compling PV-on-HVM driver on IPF. - this is same as that I send in last week. * hcall-rval.patch - fix about a return

Re: [Xen-ia64-devel] [Patch] Fix for re-enabling PV-on-HVM on IPF

2007-03-07 Thread Doi . Tsunehisa
Hi Yamahata-san, Thank you for your comment. You (yamahata) said: On Thu, Mar 08, 2007 at 01:06:04PM +0900, DOI Tsunehisa wrote: diff -r 61eb6589e720 -r b602dd142385 xen/arch/ia64/xen/mm.c --- a/xen/arch/ia64/xen/mm.cTue Mar 06 21:11:37 2007 +0900 +++ b/xen/arch/ia64/xen/mm.c

Re: [Xen-ia64-devel] [Patch] Fix for re-enabling PV-on-HVM on IPF

2007-03-08 Thread Doi . Tsunehisa
You (yamahata) said: + guest_physmap_remove_page(d, gpfn, mfn); + +/* post-set PGC_allocated flag */ +do { +x = mfn_to_page(mfn)-count_info; +if ((x PGC_count_mask) == 0) +goto out; +

Re: [Xen-ia64-devel] [Patch] Fix for re-enabling PV-on-HVM on IPF

2007-03-08 Thread Doi . Tsunehisa
You (yamahata) said: Probably it should looks like the following. if (page-count_info != 1) { /* no one but us is using this page */ put_page(page); goto out; } __set_bit(page-count_info, _PGC_allocated); Does `page-count_info' have to be operated with atomic ? Atomic

Re: [Xen-ia64-devel] [Patch] Fix for re-enabling PV-on-HVM on IPF

2007-03-08 Thread DOI Tsunehisa
Hi all, I've modified it, so submit the patch. [EMAIL PROTECTED] wrote: You (yamahata) said: Probably it should looks like the following. if (page-count_info != 1) { /* no one but us is using this page */ put_page(page); goto out; } __set_bit(page-count_info, _PGC_allocated);

[Xen-ia64-devel] Re: [PATCH] fix the ia64 p2m semantic

2007-03-25 Thread Doi . Tsunehisa
Hi Isaku, Sorry for late response. You (yamahata) said: Tsunehisa. I haven't tested arch_memory_op(). Could you verify it? I've checked this patch on the latest change set(cs:14513). It occured hypervisor crash at that xen-platform.ko was inserted. And, hypervisor said as follow:

[Xen-ia64-devel] Re: [PATCH] fix the ia64 p2m semantic

2007-03-25 Thread Doi . Tsunehisa
FYI. Original change set is not crashed. I (Doi.Tsunehisa) said: Hi Isaku, Sorry for late response. You (yamahata) said: Tsunehisa. I haven't tested arch_memory_op(). Could you verify it? I've checked this patch on the latest change set(cs:14513). It occured hypervisor

Re: [Xen-ia64-devel] Re: [PATCH] fix the ia64 p2m semantic

2007-03-25 Thread Doi . Tsunehisa
Hi Isaku, I (Doi.Tsunehisa) said: If so, the BUG_ON() is bogus. Probably it should be something like BUG_ON(page-count_info != 1 page-count_info != (PGC_allocated | 1)). BUG_ON((page-count_info PGC_count_mask) != 1) is better, I think. I've checked this modification. PV-on-HVM driver

Re: [Xen-ia64-devel] Re: [PATCH] fix the ia64 p2m semantic

2007-03-26 Thread Doi . Tsunehisa
You (yamahata) said: Thanks. Attached updated one. I've tested this patch. PV-on-HVM driver worked correctly. Thanks, - Tsunehisa Doi ___ Xen-ia64-devel mailing list Xen-ia64-devel@lists.xensource.com http://lists.xensource.com/xen-ia64-devel