From mboxrd@z Thu Jan 1 00:00:00 1970 From: Joe Jin Subject: Re: nr_irqs_gsi Date: Tue, 24 Jul 2012 10:25:06 +0800 Message-ID: <500E0782.5070200@oracle.com> References: <4FFCF3AE.1050200@oracle.com> <4FFD4A72.9090500@citrix.com> <20120711140057.GA16523@phenom.dumpdata.com> <4FFE33A9.3060203@oracle.com> <500D6E1D020000780008FECB@nat28.tlf.novell.com> <20120723153403.GG793@phenom.dumpdata.com> <500E0265.6090402@oracle.com> <20120724020201.GC10884@phenom.dumpdata.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20120724020201.GC10884@phenom.dumpdata.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Konrad Rzeszutek Wilk Cc: Andrew Cooper , Jan Beulich , xen-devel@lists.xen.org List-Id: xen-devel@lists.xenproject.org On 07/24/12 10:02, Konrad Rzeszutek Wilk wrote: > On Tue, Jul 24, 2012 at 10:03:17AM +0800, Joe Jin wrote: >> On 07/23/12 23:34, Konrad Rzeszutek Wilk wrote: >>> On Mon, Jul 23, 2012 at 02:30:37PM +0100, Jan Beulich wrote: >>>>>>> On 12.07.12 at 04:17, Joe Jin wrote: >>>>>>>> (XEN) ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0]) >>>>>>>> (XEN) IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 >>>>>>>> (XEN) ACPI: IOAPIC (id[0x01] address[0xfec80000] gsi_base[32]) >>>>>>>> (XEN) IOAPIC[1]: apic_id 1, version 32, address 0xfec80000, GSI 32-55 >>>>> >>>>> Below came from dom0: >>>>> >>>>> ACPI: LAPIC_NMI (acpi_id[0xff] high edge lint[0x1]) >>>>> ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0]) >>>>> IOAPIC[0]: apic_id 0, version 255, address 0xfec00000, GSI 0-255 >>>> >>>> Now this and ... >>>> >>>>> ACPI: IOAPIC (id[0x01] address[0xfec80000] gsi_base[32]) >>>>> IOAPIC[1]: apic_id 1, version 255, address 0xfec80000, GSI 32-287 >>>> >>>> ... this is clearly bogus, contradicting what Xen itself prints (see >>>> above). >>> >>> Yeah, that got fixed up in v3.5 (merge git f08b9c2f8af0d61faa1170aeae4fbca1eff6a504) >>> specifically: >>> >>> x86/apic: Fix UP boot crash >>> xen/apic: implement io apic read with hypercall >>> xen/x86: Implement x86_apic_ops >>> x86/apic: Replace io_apic_ops with x86_io_apic_ops. >>> x86/ioapic: Add io_apic_ops driver layer to allow interception >>> >> >> Konrad, >> >> Would you please point out which commit is make sense for this issue? so far I still >> suspend it's a hypervisor issue rather than dom0 kernel. > > I concur. The patches above are just for reporting the GSI properly in the initial domain. Thanks for the input, I'll waiting the customer's response, for I did not reproduced it, once confirm it works, we can include Jan's patch. Thanks, Joe