> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, September 26, 2016 9:03 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org
> Subject: Re: [PATCH v4 6/6]
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, September 26, 2016 8:58 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org
> Subject: Re: [PATCH v4 5/6]
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, September 26, 2016 8:46 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org
> Subject: Re: [PATCH v4 4/6]
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, September 26, 2016 7:47 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org
> Subject: Re: [PATCH v4 2/6]
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Monday, September 26, 2016 8:10 PM
> To: Wu, Feng
> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com;
> george.dun...@eu.citrix.com; Tian, Kevin ; xen-
> de...@lists.xen.org
> Subject: Re: [Xen-devel] [PA
This run is configured for baseline tests only.
flight 67775 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67775/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-insta
This run is configured for baseline tests only.
flight 67772 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67772/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 1
flight 101173 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101173/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 9 debian-di-install fail REGR. vs. 101172
test-armhf-armhf-
When trying to boot a kernel with the p2m list not mapped by the
initial kernel mapping it can happen that pvgrub is failing as it is
keeping some page tables mapped.
Unmap the additional page tables created for the special p2m mapping
will avoid this failure.
Reported-by: Sven Koehler
Signed-of
flight 101174 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101174/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On Mon, Sep 26, 2016 at 12:18:06PM +0200, Dario Faggioli wrote:
>On Sat, 2016-09-24 at 11:39 +0800, Wei Yang wrote:
>> On Thu, Sep 22, 2016 at 11:12:15AM +0200, Dario Faggioli wrote:
>> > _Almost_ correct. However, the problem is more that vcpu_wake() can
>> > happen in response to an IRQ, and when
On 28/09/16 01:33, Sven Köhler wrote:
> Am 27.09.2016 um 14:52 schrieb Juergen Gross:
>> On 27/09/16 14:09, Sven Köhler wrote:
>>> Am 27.09.2016 um 14:02 schrieb Juergen Gross:
On 27/09/16 13:13, Sven Köhler wrote:
> Am 27.09.2016 um 07:31 schrieb Juergen Gross:
>> On 27/09/16 00:48, S
Hi, Ian,
Any comments? That would be very appreciated. Thanks!
BRs,
Sun Yi
On 16-09-23 15:24:57, Yi Sun wrote:
> On 16-09-22 11:09:31, Ian Jackson wrote:
> > Yi Sun writes ("[v2 3/3] tools & docs: add L2 CAT support in tools and
> > docs."):
> > > This patch is the xl/xc changes to support Inte
From: Paulina Szubarczyk
Copy data operated on during request from/to local buffers to/from
the grant references.
Before grant copy operation local buffers must be allocated what is
done by calling ioreq_init_copy_buffers. For the 'read' operation,
first, the qemu device invokes the read operati
t tags/xen-20160927-tag
for you to fetch changes up to b6eb9b45f7307638ff166401721ae6d0401e1d67:
qdisk - hw/block/xen_disk: grant copy implementation (2016-09-27 18:18:55
-0700)
Xen
On Fri, 23 Sep 2016, Edgar E. Iglesias wrote:
> From: "Edgar E. Iglesias"
>
> This series adds support for mapping mmio-sram nodes into dom0
> as normal uncached MEMORY with RW perms.
>
> If the no-memory-wc prop is present in the DTB node, we create
> DEVICE RW mappings instead.
>
> Comments w
This run is configured for baseline tests only.
flight 67774 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67774/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf eab26788156436a549610a299d2e297c22043e70
baseline v
On Thu, 15 Sep 2016, Julien Grall wrote:
> Hello all,
>
> The ARM architecture mandates the use of a break-before-make sequence when
> changing translation entries if the page table is shared between multiple
> CPUs whenever a valid entry is replaced by another valid entry (see D4.7.1
> in ARM DDI
Hello Andrew,
On 27/09/2016 17:07, Andrew Cooper wrote:
On 28/09/2016 01:01, Julien Grall wrote:
Hi Tamas,
On 03/08/2016 11:13, Tamas K Lengyel wrote:
The only way a guest may trip with stage 2 access violation is if
mem_access is
or was in-use, so reinjecting these exceptions to the guest is
Hi Tamas,
On 16/09/2016 10:43, Tamas K Lengyel wrote:
The ARM SMC instructions are already configured to trap to Xen by default. In
this patch we allow a user-space process in a privileged domain to receive
notification of when such event happens through the vm_event subsystem by
introducing the
On 28/09/2016 01:01, Julien Grall wrote:
> Hi Tamas,
>
> On 03/08/2016 11:13, Tamas K Lengyel wrote:
>> The only way a guest may trip with stage 2 access violation is if
>> mem_access is
>> or was in-use, so reinjecting these exceptions to the guest is never
>> required.
>>
>> Requested-by: Julien
Hi Tamas,
On 03/08/2016 11:13, Tamas K Lengyel wrote:
The only way a guest may trip with stage 2 access violation is if mem_access is
or was in-use, so reinjecting these exceptions to the guest is never required.
Requested-by: Julien Grall
Signed-off-by: Tamas K Lengyel
Reviewed-by: Julien
Hi Edgar,
On 23/09/2016 11:53, Edgar E. Iglesias wrote:
From: "Edgar E. Iglesias"
Map mmio-sram nodes as un-cached memory. If the node
has set the no-memory-wc property, we map it as device.
The DTS bindings for mmio-sram nodes can be found in the
Linux tree under Documentation/devicetree/bin
Hi Edgar,
On 23/09/2016 11:53, Edgar E. Iglesias wrote:
From: "Edgar E. Iglesias"
Rename and generalize un/map_regions_rw_cache into
un/map_regions_p2mt. The new functions take the mapping
attributes as an argument.
No functional change.
Signed-off-by: Edgar E. Iglesias
Acked-by: Julien G
Hi Edgar,
On 23/09/2016 11:53, Edgar E. Iglesias wrote:
From: "Edgar E. Iglesias"
Add support for describing normal non-cacheable memory.
Signed-off-by: Edgar E. Iglesias
Acked-by: Julien Grall
Regards,
--
Julien Grall
___
Xen-devel mailing l
Am 27.09.2016 um 14:52 schrieb Juergen Gross:
> On 27/09/16 14:09, Sven Köhler wrote:
>> Am 27.09.2016 um 14:02 schrieb Juergen Gross:
>>> On 27/09/16 13:13, Sven Köhler wrote:
Am 27.09.2016 um 07:31 schrieb Juergen Gross:
> On 27/09/16 00:48, Sven Köhler wrote:
>> Am 26.09.2016 um 07:
flight 101172 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101172/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 101156
test-amd64-amd64-xl-rtds
Hi Edgar,
On 23/09/2016 11:53, Edgar E. Iglesias wrote:
From: "Edgar E. Iglesias"
Rename p2m_mmio_direct_nc to p2m_mmio_direct_dev to better
express that we are mapping device memory. This will allow us
to use p2m_mmio_direct_nc for Normal Non-Cached mappings.
No functional change.
Signed-of
Hi Jan,
On 27/09/2016 01:06, Jan Beulich wrote:
On 26.09.16 at 22:01, wrote:
On 25/09/2016 23:53, Jan Beulich wrote:
On 24.09.16 at 01:35, wrote:
On 23/09/2016 22:47, Daniel Kiper wrote:
@@ -66,6 +67,7 @@ integer_param("xenheap_megabytes", opt_xenheap_megabytes);
static __used void init_
Hi Konrad,
On 27/09/2016 10:50, Konrad Rzeszutek Wilk wrote:
On Tue, Sep 27, 2016 at 09:39:06AM -0700, Julien Grall wrote:
- Rebased on "livepatch: Drop _jmp from arch_livepatch_[apply,revert]_jmp"
- Added explanation for the usage of data cache and why we need to sync it.
... you als
This run is configured for baseline tests only.
flight 67773 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67773/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7807dea57fba6a019bb8641572e0159ffa03ad9e
baseline v
flight 101169 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101169/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 16 guest-start.2fail REGR. vs. 101159
test-amd64-amd64-xl-rtds
On Mon, Sep 26, 2016 at 09:53:45AM -0600, Jan Beulich wrote:
> >>> On 23.09.16 at 23:47, wrote:
> > @@ -383,10 +390,19 @@ __start:
> > cmp %edi,MB2_fixed_total_size(%ebx)
> > jbe trampoline_bios_setup
> >
> > +/* Get Xen image load base address from Multiboot2 inf
On Mon, Sep 26, 2016 at 09:03:30AM -0600, Jan Beulich wrote:
> >>> On 23.09.16 at 23:47, wrote:
> > @@ -426,32 +453,65 @@ trampoline_bios_setup:
> > xor %cl, %cl
> >
> > trampoline_setup:
> > +/*
> > + * Called on legacy BIOS and EFI platforms.
> > + *
> > +
flight 101170 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101170/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf eab26788156436a549610a299d2e297c22043e70
baseline version:
ovmf 7807dea57fba6a019bb86
flight 101171 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101171/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xtf efe6103963c6756f5c7b7726adf4e2aea53cd51b
baseline version:
xtf b5c5332de4268d33a6f8ea
On 2016/9/27 9:35, Wei Liu wrote:
On Tue, Sep 27, 2016 at 09:01:00AM -0700, Shannon Zhao wrote:
On 2016/9/27 2:41, Wei Liu wrote:
On Mon, Sep 26, 2016 at 02:54:55PM -0700, Shannon Zhao wrote:
On 2016/9/22 7:10, Wei Liu wrote:
diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.
On Mon, Sep 26, 2016 at 09:12:40AM -0600, Jan Beulich wrote:
> >>> On 26.09.16 at 16:40, wrote:
> > On 26/09/16 15:33, Jan Beulich wrote:
> > On 26.09.16 at 16:19, wrote:
> >>> On 23/09/16 22:47, Daniel Kiper wrote:
> +/*
> + * Initialize BSS (no nasty surprises!).
>
On Mon, Sep 26, 2016 at 07:47:42AM -0600, Jan Beulich wrote:
> >>> On 23.09.16 at 23:47, wrote:
> > This way Xen can be loaded on EFI platforms using GRUB2 and
> > other boot loaders which support multiboot2 protocol.
> >
> > Signed-off-by: Daniel Kiper
> > Acked-by: Jan Beulich
> > ---
> > v7 -
On Tue, Sep 27, 2016 at 09:39:06AM -0700, Julien Grall wrote:
> Hi Konrad,
>
> On 21/09/2016 10:32, Konrad Rzeszutek Wilk wrote:
> > The patch piggybacks on: livepatch: Initial ARM64 support, which
> > brings up all of the necessary livepatch infrastructure pieces in.
> >
> > This patch adds thre
On Mon, Sep 26, 2016 at 07:37:45AM -0600, Jan Beulich wrote:
> >>> On 23.09.16 at 23:47, wrote:
> > --- a/xen/common/efi/boot.c
> > +++ b/xen/common/efi/boot.c
> > @@ -79,6 +79,10 @@ static size_t wstrlen(const CHAR16 * s);
> > static int set_color(u32 mask, int bpp, u8 *pos, u8 *sz);
> > static
On Mon, Sep 26, 2016 at 06:32:01AM -0600, Jan Beulich wrote:
> >>> On 26.09.16 at 13:34, wrote:
> > On Mon, Sep 26, 2016 at 04:39:37AM -0600, Jan Beulich wrote:
> >> >>> On 23.09.16 at 23:47, wrote:
> >> > It seems that from xen ELF image POV _end symbol properly determine
> >> > image end. Howev
On Tue, Sep 27, 2016 at 02:26:00AM -0600, Jan Beulich wrote:
> >>> On 26.09.16 at 20:13, wrote:
> > On Wed, Sep 21, 2016 at 10:22:32AM -0700, Lai, Paul wrote:
> >> On Wed, Sep 21, 2016 at 02:39:58AM -0600, Jan Beulich wrote:
> >> > >>> On 21.09.16 at 00:35, wrote:
> >> > > On Tue, Sep 20, 2016 at
On Tue, Sep 27, 2016 at 06:28:10PM +0200, Samuel Thibault wrote:
> Juergen Gross, on Tue 27 Sep 2016 14:06:24 +0200, wrote:
> > When building Mini-OS with an app which is using xen libraries like
> > libxenguest.a let mini-os_app.o depend on the library binaries as it
> > is statically linked with
On 27/09/16 17:39, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> .gitignore | 3 +++
> Makefile | 10 +-
> 2 files changed, 12 insertions(+), 1 deletion(-)
>
> diff --git a/.gitignore b/.gitignore
> index f69e7fc..28c7874 100644
> --- a/.gitignore
> +++ b/.gitignore
> @@ -11,3 +11,6
Hi Konrad,
On 23/09/2016 08:44, Konrad Rzeszutek Wilk wrote:
Here is the updated patch:
From deef8f6921c15a4d07209bfba1fc8697dbfeb605 Mon Sep 17 00:00:00 2001
From: Konrad Rzeszutek Wilk
Date: Mon, 19 Sep 2016 12:24:09 -0400
Subject: [PATCH v6] livepatch: Initial ARM64 support.
As compared to
Hi Konrad,
On 21/09/2016 10:32, Konrad Rzeszutek Wilk wrote:
The patch piggybacks on: livepatch: Initial ARM64 support, which
brings up all of the necessary livepatch infrastructure pieces in.
This patch adds three major pieces:
1) ELF relocations. ARM32 uses SHT_REL instead of SHT_RELA which
Signed-off-by: Wei Liu
---
.gitignore | 3 +++
Makefile | 10 +-
2 files changed, 12 insertions(+), 1 deletion(-)
diff --git a/.gitignore b/.gitignore
index f69e7fc..28c7874 100644
--- a/.gitignore
+++ b/.gitignore
@@ -11,3 +11,6 @@
/selftests/test-*
/tests/*/test-*
/tests/*/info.j
On Tue, Sep 27, 2016 at 09:01:00AM -0700, Shannon Zhao wrote:
>
>
> On 2016/9/27 2:41, Wei Liu wrote:
> >On Mon, Sep 26, 2016 at 02:54:55PM -0700, Shannon Zhao wrote:
> >>
> >>
> >>On 2016/9/22 7:10, Wei Liu wrote:
> diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
> >index
Juergen Gross, on Tue 27 Sep 2016 14:06:24 +0200, wrote:
> When building Mini-OS with an app which is using xen libraries like
> libxenguest.a let mini-os_app.o depend on the library binaries as it
> is statically linked with them.
>
> While at it add "-T" before app.lds for linking mini-os_app.o
On Tue, Sep 27, 2016 at 06:03:28PM +0200, Juergen Gross wrote:
> On 27/09/16 17:56, Wei Liu wrote:
> > On Tue, Sep 27, 2016 at 02:06:24PM +0200, Juergen Gross wrote:
> >> When building Mini-OS with an app which is using xen libraries like
> >> libxenguest.a let mini-os_app.o depend on the library b
On 27/09/2016 16:35, "Konrad Rzeszutek Wilk"
wrote:
>On Tue, Sep 27, 2016 at 03:16:50PM +0100, Lars Kurth wrote:
>> The COPYING file in the main xen.git tree applies to most files in the
>> xen tree, including the ones in this patch. It states:
>>
>> [1]
>> * Note that the only valid version
... and using the "preempted" parameter. The solution relies on just calling
softirq_pending if the current domain is the idle domain.
Signed-off-by: Roger Pau Monné
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/mm/hap/hap.c | 4 +++-
1 file changed, 3 insertions(+)
On 27/09/16 17:56, Wei Liu wrote:
> On Tue, Sep 27, 2016 at 02:06:24PM +0200, Juergen Gross wrote:
>> When building Mini-OS with an app which is using xen libraries like
>> libxenguest.a let mini-os_app.o depend on the library binaries as it
>> is statically linked with them.
>>
>> While at it add
On 2016/9/27 2:41, Wei Liu wrote:
On Mon, Sep 26, 2016 at 02:54:55PM -0700, Shannon Zhao wrote:
On 2016/9/22 7:10, Wei Liu wrote:
diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
index 2924629..118beab 100644
--- a/tools/libxl/libxl_dom.c
+++ b/tools/libxl/libxl_dom.c
@@ -408
So that it can be called from the Dom0 builder.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/e820.c| 2 +-
xen/include/asm-x86/e820.h | 1 +
2 files changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/e
Add a new MMIO handler that traps accesses to PCIe regions, as discovered by
Xen from the MCFG ACPI table. The handler used is the same as the one used
for accesses to the IO PCI configuration space.
Signed-off-by: Roger Pau Monné
---
Cc: Paul Durrant
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen
The current msixtbl intercepts only partially trap MSI-X accesses, but are
not complete, there's missing logic in order to setup PIRQs and bind them to
domains. Disable them for domains without at least an ioreq server (PVH).
Signed-off-by: Roger Pau Monné
---
Cc: Paul Durrant
Cc: Jan Beulich
C
Split the Dom0 builder into two different functions, one for PV (and classic
PVH), and another one for PVHv2. Introduce a new command line parameter,
dom0hvm in order to request the creation of a PVHv2 Dom0.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since
The current code used by Intel VTd will only map RMRR regions for the
hardware domain, but will fail to map RMRR regions for unprivileged domains
unless the page tables are shared between EPT and IOMMU. Fix this and
simplify the code, removing the {set/clear}_identity_p2m_entry helpers and
just usi
This requires adding handlers to the PCI configuration space, plus a MMIO
handler for the MSI-X table, the PBA is left mapped directly into the guest.
The implementation is based on the one already found in the passthrough
code from QEMU.
Signed-off-by: Roger Pau Monné
---
Paul Durrant
Jan Beuli
This is done adding some Dom0 specific logic to the IO APIC emulation inside
of Xen, so that writes to the IO APIC registers that should unmask an
interrupt will take care of setting up this interrupt with Xen. A Dom0
specific EIO handler also has to be used, since Xen doesn't know the
topology of
... and remove hap_set_alloc_for_pvh_dom0.
Signed-off-by: Roger Pau Monné
Acked-by: Tim Deegan
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Tim Deegan
---
Changes since RFC:
- Make paging_set_allocation preemtable.
- Move comments.
---
xen/arch/x86/domain_build.c | 17 +
Import the MSI handlers from QEMU into Xen. This allows Xen to detect
accesses to the MSI registers and correctly setup PIRQs for physical devices
that are then bound to the hardware domain.
The current logic only allows the usage of a single MSI interrupt per
device, so the maximum queue size ann
Add handlers to detect attemps from a PVHv2 Dom0 to change the position of
the PCI BARs and properly remap them.
Signed-off-by: Roger Pau Monné
---
Cc: Paul Durrant
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/io.c | 2 +
xen/drivers/passthrough/pci.c | 307 +++
Xen already allows setting the store event channel, and this parameter is
not used by Xen at all.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/hvm.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
This maps all the regions in the e820 marked as E820_ACPI or E820_NVS and
the top-level ACPI tables discovered by Xen to Dom0 1:1. It also shadows the
page(s) where the native MADT is placed by mapping a RAM page over it,
copying the original data and modifying it afterwards in order to represent
t
Instead of being tied to the presence of an IOMMU
Signed-off-by: Roger Pau Monné
Suggested-by: Andrew Cooper
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Suravee Suthikulpanit
Cc: Kevin Tian
Cc: Feng Wu
---
xen/arch/x86/setup.c| 2 ++
xen/drivers/passthrough/amd/pci_am
Introduce a helper to parse the Dom0 kernel.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/domain_build.c | 138
1 file changed, 138 insertions(+)
diff --git a/xen/arch/x86/domain_build.c b/xen/arch/x86/domai
Craft the Dom0 e820 memory map and populate it.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since RFC:
- Use IS_ALIGNED instead of checking with PAGE_MASK.
- Use the new %pB specifier in order to print sizes in human readable form.
- Create a VM86 TSS for
This is very similar to the PCI trap used for the traditional PV(H) Dom0.
Signed-off-by: Roger Pau Monné
---
Cc: Paul Durrant
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/io.c | 72 ++-
xen/arch/x86/traps.c | 39 --
Signed-off-by: Roger Pau Monné
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/mm/p2m.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index 44492ae..c989b60 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen
Most of this code has been picked up from QEMU and modified so it can be
plugged into the internal Xen IO handlers. The structure of the handlers has
been keep quite similar to QEMU, so existing handlers can be imported
without a lot of effort.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/domain_build.c | 26 ++
1 file changed, 26 insertions(+)
diff --git a/xen/arch/x86/domain_build.c b/xen/arch/x86/domain_build.c
index 407f742..b4a14a3 100644
--- a/xen/arch/x86/domain_
Because it's also going to be used by other code.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
---
xen/drivers/passthrough/pci.c | 86 ++-
1 file changed, 53 insertions(+), 33 deletions(-)
diff --git a/xen/drivers/passthrough/pci.c b/xen/drivers/pa
Initialize Dom0 BSP/APs and setup the memory and IO permissions.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
The logic used to setup the CPUID leaves is extremely simplistic (and
probably wrong for hardware different than mine). I'm not sure what's the
best way to d
... and introduce a floor variant.
Signed-off-by: Roger Pau Monné
---
Cc: Stefano Stabellini
Cc: Julien Grall
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Boris Ostrovsky
Cc: Suravee Suthikulpanit
Cc: Konrad Rzeszutek Wilk
---
xen/arch/arm/domain.c| 2 +-
xen/arch/arm/domain
This is also required for PVHv2 guests if they want to use real-mode, and
hvmloader is not executed for those kind of guests.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Ian Jackson
Cc: Wei Liu
---
tools/firmware/hvmloader/hvmloader.c | 17 -
tool
Introduce a new %pB format specifier to print sizes (in bytes) in a
human-readable form.
Signed-off-by: Roger Pau Monné
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
docs/misc/printk
Allow the use of both the emulated local APIC and IO APIC for the hardware
domain.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since RFC:
- Move the emulation flags check to a separate helper.
---
xen/arch/x86/domain.c | 28 +---
1
It doesn't make sense since the idle domain doesn't receive any events.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/include/asm-x86/event.h | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xen/include/asm-x86/event.h b/xen/include/asm-x86/event.h
index a8
So that it can also be used by the PVH-specific domain builder. This is just
code motion, it should not introduce any functional change.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/domain_build.c | 164 +++-
1 fi
On PVHv2 guests we explicitly want to use native methods for routing
interrupts.
Introduce a new XEN_X86_EMU_USE_PIRQ to notify Xen whether a HVM guest can
route physical interrupts (even from emulated devices) over event channels.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew C
Hello,
This is the first "complete" PVHv2 implementation in the sense that
it has feature parity with classic PVH Dom0. It is still very experimental,
but I've managed to boot it on all Intel boxes I've tried (OK, only 3 so far).
I've also tried on an AMD box, but sadly the ACPI tables there didn'
Return should be an int, and the number of pages should be an unsigned long.
Signed-off-by: Roger Pau Monné
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Tim Deegan
---
xen/arch/x86/mm/hap/hap.c | 6 +++---
xen/arch/x86/mm/shadow/common.c | 7 +++
xen/include/asm-x8
On Tue, Sep 27, 2016 at 02:06:24PM +0200, Juergen Gross wrote:
> When building Mini-OS with an app which is using xen libraries like
> libxenguest.a let mini-os_app.o depend on the library binaries as it
> is statically linked with them.
>
> While at it add "-T" before app.lds for linking mini-os_
On 27/09/16 14:56, Jan Beulich wrote:
On 27.09.16 at 15:42, wrote:
>> On 15/09/16 07:55, Jan Beulich wrote:
>> On 14.09.16 at 19:56, wrote:
On 08/09/16 14:14, Jan Beulich wrote:
> int __get_instruction_length_from_list(struct vcpu *v,
> const enum instruction_index
On Tue, Sep 27, 2016 at 10:46:18AM -0400, Boris Ostrovsky wrote:
> Some code (specifically, introduced by commit 801d469ad ("[HVM] ACPI
> support patch 3 of 4: ACPI _PRT table.")) has only been licensed under
> GPLv2. We want to prevent this code from showing up in non-GPL
> binaries which might be
On Tue, Sep 27, 2016 at 03:16:50PM +0100, Lars Kurth wrote:
> The COPYING file in the main xen.git tree applies to most files in the
> xen tree, including the ones in this patch. It states:
>
> [1]
> * Note that the only valid version of the GPL as far as the files in
> * this repository are con
Add macros for HVM_PARAM_CALLBACK_TYPE_PPI operation values and update
them in evtchn_fixup().
Also use HVM_PARAM_CALLBACK_IRQ_TYPE_MASK in hvm_set_callback_via().
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Shannon Zhao
---
xen/arch/arm/domain_build.c | 9 ++---
xen/arch/x86/hvm
This run is configured for baseline tests only.
flight 67771 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67771/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 333ba578fef4dff8921051410c5b56f63e7eeadb
baseline v
flight 101164 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101164/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt-qcow2 6 xen-boot fail in 101159 pass in 101164
test-armhf-armhf-xl-credit2 15 g
Estimate the size of ACPI tables and reserve a memory map space for ACPI
tables.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 100 +++
xen/include/acpi/actbl1.h| 2 +
2 files changed, 102 insertions(+)
diff --git a/tools/libxl/libx
On Tue, Sep 27, 2016 at 09:22:37AM -0500, Doug Goldstein wrote:
> On 9/26/16 3:53 PM, nimisha agarwal wrote:
> > Hello,
> > I wish to take part in the Outreach Program this time. The
> > second project that interest me is *Code Standards Checking using
> > clang-format. *I am currently looking th
On 09/27/2016 04:20 AM, Fam Zheng wrote:
> 9c5ce8db2 switched the type of qemu_uuid and this should have followed.
> Fix it.
>
> Signed-off-by: Fam Zheng
> ---
> hw/xenpv/xen_domainbuild.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
Reviewed-by: Eric Blake
>
> diff --git a/hw/xen
flight 67770 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67770/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-armhf-daily-netboot-pygrub 9 debian-di-install fail blocked
in 67732
test-a
Some code (specifically, introduced by commit 801d469ad ("[HVM] ACPI
support patch 3 of 4: ACPI _PRT table.")) has only been licensed under
GPLv2. We want to prevent this code from showing up in non-GPL
binaries which might become possible after we make ACPI builder code
available to users other th
On 27/09/16 16:19, David Vrabel wrote:
> On 27/09/16 15:08, Boris Ostrovsky wrote:
>> I will be dusting off Linux domU PVHv2 patches now that ACPI changes are
>> getting close to being accepted.
>>
>> Last version of that patch referred to these guests as 'hvmlite',
>> including in names of variabl
Hey!
If the guest is booted with 'pci' we nicely expand the MMIO region below
4GB and try to fit in the BARs in there. If that fails (not enough
space) we move it above the memory (64-bit). And throughout all of this
we also update the _CRS field to cover these ranges.
(Note, I need to check if t
On Tue, Sep 27, 2016 at 03:19:32PM +0100, David Vrabel wrote:
> On 27/09/16 15:08, Boris Ostrovsky wrote:
> > I will be dusting off Linux domU PVHv2 patches now that ACPI changes are
> > getting close to being accepted.
> >
> > Last version of that patch referred to these guests as 'hvmlite',
> >
1 - 100 of 146 matches
Mail list logo