Add hooks to manage AVIC data structure during vcpu scheduling.
Signed-off-by: Suravee Suthikulpanit
---
xen/arch/x86/hvm/svm/avic.c | 82 +
xen/arch/x86/hvm/svm/svm.c | 10 ++
2 files changed, 92 insertions(+)
diff --git a/xen/arch/x86/hvm/svm/a
GITHUB
==
Latest git tree can be found at:
http://github.com/ssuthiku/xen.gitxen_avic_part1_v1
OVERVIEW
This patch set is the first of the two-part patch series to introduce
the new AMD Advance Virtual Interrupt Controller (AVIC) support.
Basically, SVM AVIC hardware virtual
Hook up virtual_intr_delivery_enabled and deliver_posted_intr functions
when AVIC is enabled.
Signed-off-by: Suravee Suthikulpanit
---
xen/arch/x86/hvm/svm/svm.c | 10 ++
xen/include/asm-x86/hvm/svm/avic.h | 5 +
2 files changed, 15 insertions(+)
diff --git a/xen/arch/x86/h
Enabling AVIC implicitly disables the V_IRQ, V_INTR_PRIO, V_IGN_TPR,
and V_INTR_VECTOR fields in the VMCB Control Word. Therefore, this patch
introduces new interrupt injection code via AVIC backing page.
Also, the AVIC hardware automatically synchronizes TPR and CR8/vTPR, when
values are updated.
Expose vlapic_read_aligned and vlapic_reg_write() to be used by AVIC.
Signed-off-by: Suravee Suthikulpanit
---
xen/arch/x86/hvm/vlapic.c| 5 ++---
xen/include/asm-x86/hvm/vlapic.h | 4
2 files changed, 6 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/hvm/vlapic.c b/xen/arc
The current function pointers for managing hvm posted interrupt
can be used also by SVM AVIC. Therefore, this patch introduces the
struct hvm_pi_ops in the struct hvm_domain to hold them.
Signed-off-by: Suravee Suthikulpanit
---
xen/arch/x86/hvm/vmx/vmx.c | 32 +--
xen/in
Introduce AVIC-related VMCB fields.
Signed-off-by: Suravee Suthikulpanit
---
xen/include/asm-x86/hvm/svm/vmcb.h | 23 +++
1 file changed, 15 insertions(+), 8 deletions(-)
diff --git a/xen/include/asm-x86/hvm/svm/vmcb.h
b/xen/include/asm-x86/hvm/svm/vmcb.h
index bad2382..768
Since vlapic_init() is called before vcpu_initialise().
We should also follow the same order here.
Signed-off-by: Suravee Suthikulpanit
---
xen/arch/x86/hvm/hvm.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 7bad845
Introduce AVIC base initialization code. This includes:
* Setting up per-VM data structures.
* Setting up per-vCPU data structure.
* Initializing AVIC-related VMCB bit fields.
This patch also introduces a new Xen parameter (svm-avic),
which can be used to enable/disable AVIC support.
C
AVIC introduces two #vmexit handlers:
* VMEXIT_INCOMP_IPI
* VMEXIT_DO_NOACCEL
Signed-off-by: Suravee Suthikulpanit
---
xen/arch/x86/hvm/svm/avic.c| 279 +
xen/arch/x86/hvm/svm/svm.c | 8 ++
xen/include/asm-x86/hvm/svm/avic.h | 3 +
xen/
This run is configured for baseline tests only.
flight 67728 linux-4.1 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67728/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf
This patch implemented parts of TODO left in commit id
a902c12ee45fc9389eb8fe54eeddaf267a555c58 (More efficient TLB-flush
filtering in alloc_heap_pages()). It moved TLB-flush filtering out into
populate_physmap. Because of TLB-flush in alloc_heap_pages, it's very slow
to create a guest with memory
This patch cleaned up the code by replacing complicated tlbflush check and
operation with inline functions. We should use those inline functions to
avoid the complicated tlbflush check and tlbflush operations when
implementing TODOs left in commit a902c12ee45fc9389eb8fe54eeddaf267a555c58
(More effi
From: Vitaly Kuznetsov
Date: Fri, 16 Sep 2016 12:59:14 +0200
> @@ -595,6 +596,19 @@ static int xennet_start_xmit(struct sk_buff *skb, struct
> net_device *dev)
> offset = offset_in_page(skb->data);
> len = skb_headlen(skb);
>
> + /* The first req should be at least ETH_HLEN siz
From: Peng Fan
Move vpidr from arch_domain to arch_vcpu.
In order to support Big.Little, Big CPUs and Little CPUs are
assigned to different cpupools.
when a new domain is to be created with cpupool specificed, the domain
is first assigned to cpupool0 and then the domain moved from cpupool0
to t
From: Peng Fan
This patchset is to support XEN run on big.little SoC.
The idea of the patch is from
"https://lists.xenproject.org/archives/html/xen-devel/2016-05/msg00465.html";
There are some changes to cpupool and add x86 stub functions to avoid build
break. Sending The RFC patchset out is to
From: Peng Fan
When migrating domain between different cpupools, need to check
whether the domain is compatible with the cpupool.
Signed-off-by: Peng Fan
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/cpupool.c | 17 -
1 file changed, 16 insertions(+), 1 deletion(-)
From: Peng Fan
Setting opt_dom0_max_vcpus according to cpu_valid in cpupool0.
Signed-off-by: Peng Fan
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/domain_build.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domai
From: Peng Fan
Introduce arch_cpupool_create, arch_cpupool_cpu_add,
and arch_domain_cpupool_compatible.
To X86, nothing to do, just add an empty stub functions.
To ARM, arch_cpupool_create initialize midr with value -1;
arch_cpupool_cpu_add, if there is cpu in the cpupool or the cpu
is the firs
From: Peng Fan
Intrdouce cpupool_arch_info.
To ARM, add a 'midr' entry to hold the MIDR info of the cpupool.
Signed-off-by: Peng Fan
Cc: Stefano Stabellini
Cc: Julien Grall
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/include/asm-arm/cpupool.h | 16
xen/include/asm-x86/cpupoo
FYI.
Thanks,
Fan Chen
-Original Message-
From: af...@apple.com [mailto:af...@apple.com]
Sent: Sunday, September 18, 2016 11:45 PM
To: Chen, Farrah
Cc: edk2-de...@ml01.01.org; xen-devel@lists.xen.org
Subject: Re: [edk2] edk2 compile error
> On Sep 17, 2016, at 8:38 PM, Chen, Farrah wr
> On Sep 13, 2016, at 9:10 AM, Nakajima, Jun wrote:
>
>
>> On Sep 13, 2016, at 2:05 AM, Andrew Cooper wrote:
>>
>> On 13/09/16 08:51, Jan Beulich wrote:
>> On 12.09.16 at 19:28, wrote:
>>> Please try to get quoting right - your response was rather hard to
>>> follow.
>>>
On Sep 12
flight 101004 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101004/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 11 guest-start fail in 101001 pass in 101004
test-armhf-armhf-libvirt-qcow2 6 x
This run is configured for baseline tests only.
flight 67727 linux-3.18 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67727/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
> On Sep 17, 2016, at 8:38 PM, Chen, Farrah wrote:
>
> Hi,
>
> When I compile xen with the latest commit in RHEL 6.7, it failed when make
> tools. Errors showed when running edk2 build for OvmfPkgX64.
> Bisected and this error occurred from commit
> 8c8b6fb02342f7aa78e611a5f0f63dcf8fbf48f2.
>
On Sat, Sep 17, 2016 at 10:34 PM, Yi Sun wrote:
> On 16-09-17 11:31:54, Meng Xu wrote:
>> On Thu, Aug 25, 2016 at 1:21 AM, Yi Sun wrote:
>> >
>> > Design document is below:
>> > ===
>> > % Intel L2 Cache Allocation Technology (L2
flight 101001 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101001/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 11 guest-start fail REGR. vs. 100753
Regressions which are
flight 101000 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101000/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail like 100758
test-amd64-i386-xl-qemuu-win7
flight 101002 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101002/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 6559a686ae77bca2539d826120c9f3bd0d75cdf8
baseline version:
xen 7735
flight 100999 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100999/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-raw 11 migrate-support-checkfail never pass
test-armhf-armhf-libvirt-raw 13 guest-sav
Hi Dario,
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Wednesday, September 14, 2016 10:52 PM
> To: Wu, Feng ; Jan Beulich
> Cc: andrew.coop...@citrix.com; george.dun...@eu.citrix.com; Tian, Kevin
> ; xen-devel@lists.xen.org
> Subject: Re: [PATCH
flight 100998 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100998/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-xsm 6 xen-boot fail pass in 100994
Regressions which are regarded a
32 matches
Mail list logo