flight 101160 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101160/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 333ba578fef4dff8921051410c5b56f63e7eeadb
baseline version:
ovmf f6be48e9907d8bb8f8534
>>> On 26.09.16 at 21:45, wrote:
> On 2016/9/22 8:00, Jan Beulich wrote:
> On 22.09.16 at 14:52, wrote:
>>> --- a/xen/include/public/hvm/params.h
>>> +++ b/xen/include/public/hvm/params.h
>>> @@ -30,6 +30,7 @@
>>> */
>>>
>>> #define HVM_PARAM_CALLBACK_IRQ 0
>>> +#define HVM_PARAM_CALLBACK_
>>> On 26.09.16 at 22:01, wrote:
> On 25/09/2016 23:53, Jan Beulich wrote:
> On 24.09.16 at 01:35, wrote:
>>> On 23/09/2016 22:47, Daniel Kiper wrote:
@@ -66,6 +67,7 @@ integer_param("xenheap_megabytes",
opt_xenheap_megabytes);
static __used void init_done(void)
{
>>> On 26.09.16 at 19:05, wrote:
> On Mon, Sep 26, 2016 at 10:19:04AM -0600, Jan Beulich wrote:
>> >>> On 29.07.16 at 18:29, wrote:
>> > Initialize Dom0 BSP/APs and setup the memory and IO permissions.
>> >
>> > Signed-off-by: Roger Pau Monné
>> > ---
>> > Cc: Jan Beulich
>> > Cc: Andrew Coope
>>> On 26.09.16 at 19:12, wrote:
> On Mon, Sep 26, 2016 at 10:25:06AM -0600, Jan Beulich wrote:
>> >>> On 29.07.16 at 18:28, wrote:
>> > This is a very rough implementation of a PVHv2 Dom0. There are still a
>> > bunch
>> > of things that will not work properly (like SR-IOV, MSI, MSI-X...), but
Current configure code doesn't define {SEABIOS/OVMF}_PATH when
--with-system-{ovmf/seabios} is used. Fix this by making sure those defines
are always set if the internal {ovmf/seabios}_path variables are also set.
Signed-off-by: Roger Pau Monné
Suggested-by: Wei Liu
Cc: Wei Liu
Cc: Ian Jackson
>>> On 26.09.16 at 20:13, wrote:
> On Wed, Sep 21, 2016 at 10:22:32AM -0700, Lai, Paul wrote:
>> On Wed, Sep 21, 2016 at 02:39:58AM -0600, Jan Beulich wrote:
>> > >>> On 21.09.16 at 00:35, wrote:
>> > > On Tue, Sep 20, 2016 at 09:50:15AM -0600, Jan Beulich wrote:
>> > >>
>> > >> Paul, there's be
flight 101161 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101161/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 12 migrate-support-checkfail never pass
test-armhf-armhf-libvirt-xsm 14 guest-sav
On 09/23/2016 02:29 AM, Konrad Rzeszutek Wilk wrote:
+bool arch_livepatch_symbol_deny(const struct livepatch_elf *elf,
+const struct livepatch_elf_sym *sym)
+{
+#ifdef CONFIG_ARM_32
Out of interest, is there any particular reason to use #ifdef rather than
adding
On Mo, 2016-09-26 at 14:43 +0200, Juergen Gross wrote:
> Trying to use pvUSB in a Xen guest with a qemu emulated USB controller
> will crash qemu as it tries to attach a pvUSB device to the emulated
> controller.
Hmm. --verbose please.
While this clearly doesn't do what you intended I think it s
On Mo, 2016-09-26 at 14:43 +0200, Juergen Gross wrote:
> Add a bus for Xen backend devices in order to be able to establish a
> dedicated device path for pluggable devices.
Looks sane to me. Can take this through the usb queue if I get an ack
from xen.
> +#define TYPE_XENSYSDEV "xensysdev"
> +#d
This run is configured for baseline tests only.
flight 67768 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67768/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf f6be48e9907d8bb8f8534df50049ce428c38f719
baseline v
On Mon, Sep 26, 2016 at 02:43:57PM +0200, Juergen Gross wrote:
> In order to be able to specify to which pvusb controller a new pvusb
> device should be added we need a qemu device for each pvusb controller
> with an associated id.
>
> Add such a device when a new controller is requested and attac
flight 101159 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101159/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 6 xen-boot fail REGR. vs. 101154
test-armhf-armhf-x
Hi,
> struct usbback_info {
> struct XenDevice xendev; /* must be first */
> +char id[24];
> +struct USBBACKDevice *dev;
> USBBus bus;
> void *urb_sring;
> void *conn_sring;
>
Boris Ostrovsky writes ("Re: [PATCH v6] acpi: Prevent GPL-only code from
seeping into non-GPL binaries"):
> This will not produce what I am trying to print tough. I want this sequence:
> B C D A C D A B D A B C A
I went back to your patch and AFAICT it doesn't generate
On Tue, Sep 27, 2016 at 10:13:17AM +0200, Roger Pau Monne wrote:
> Current configure code doesn't define {SEABIOS/OVMF}_PATH when
> --with-system-{ovmf/seabios} is used. Fix this by making sure those defines
> are always set if the internal {ovmf/seabios}_path variables are also set.
>
> Signed-of
flight 101162 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101162/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 324dd9b468fc53c1b162035334620e47a0637b41
baseline version:
ovmf 333ba578fef4dff892105
On Mon, Sep 26, 2016 at 11:30:53AM -0700, Shannon Zhao wrote:
>
>
> On 2016/9/26 2:05, Wei Liu wrote:
> >On Mon, Sep 26, 2016 at 03:08:43PM +0800, Shannon Zhao wrote:
> >>>
> >>>
> >>> On 2016/9/22 22:32, Wei Liu wrote:
> >FAOD:
> >
> >I think all the issues I found so far in this
9c5ce8db2 switched the type of qemu_uuid and this should have followed.
Fix it.
Signed-off-by: Fam Zheng
---
hw/xenpv/xen_domainbuild.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/hw/xenpv/xen_domainbuild.c b/hw/xenpv/xen_domainbuild.c
index b439b0e..457a897 100644
--- a/
On Mon, Sep 26, 2016 at 02:54:55PM -0700, Shannon Zhao wrote:
>
>
> On 2016/9/22 7:10, Wei Liu wrote:
> >>diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
> >>> index 2924629..118beab 100644
> >>> --- a/tools/libxl/libxl_dom.c
> >>> +++ b/tools/libxl/libxl_dom.c
> >>> @@ -408,8 +408
On 09/21/2016 06:32 PM, Konrad Rzeszutek Wilk wrote:
To use as a common way of testing alternative patching for
livepatches. Both architectures have this FEATURE and the
test-cases can piggyback on that.
Suggested-by: Julien Grall
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Ross Lager
On 09/23/2016 02:33 AM, Konrad Rzeszutek Wilk wrote:
.snip..
diff --git a/xen/test/Makefile b/xen/test/Makefile
index 8c53040..95c1755 100644
--- a/xen/test/Makefile
+++ b/xen/test/Makefile
@@ -1,6 +1,6 @@
.PHONY: tests
tests:
I am wondering if there is any way to use the
-ifeq ($(XEN_TARGET
On Mon, Sep 26, 2016 at 05:06:49PM +0100, Lars Kurth wrote:
> This patch adds information related to non-GPL licenses and code
> imports from 3rd party projects. The aim of this patch, is to
> make it easier for future contributors, to perform a review
> of the codebase.
>
> Signed-off-by: Lars Ku
On Tue, Sep 20, 2016 at 05:29:39PM -0400, Chris Patterson wrote:
> From: Chris Patterson
>
> xs_watch() creates a thread to listen to xenstore events. Currently, the
> thread is created with the greater of 16K or PTHREAD_MIN_SIZE.
>
> There have been several bug reports and workarounds related
On 27/09/16 11:06, Wei Liu wrote:
On Tue, Sep 20, 2016 at 05:29:39PM -0400, Chris Patterson wrote:
> From: Chris Patterson
>
> xs_watch() creates a thread to listen to xenstore events. Currently, the
> thread is created with the greater of 16K or PTHREAD_MIN_SIZE.
>
> There have been several b
Wei Liu writes ("Re: [RFC PATCH] xs: use system's default stack size for
xs_watch's reader thread"):
> On Tue, Sep 20, 2016 at 05:29:39PM -0400, Chris Patterson wrote:
> > Of course, the alternative is to bump it to another arbitrary value, but the
> > requirements may change depending on the appl
Am 27.09.2016 um 07:31 schrieb Juergen Gross:
> On 27/09/16 00:48, Sven Köhler wrote:
>> Am 26.09.2016 um 07:43 schrieb Juergen Gross:
>>> On 25/09/16 18:04, Sven Köhler wrote:
Hi,
I'm experiencing the bug below which was discussed on xen-devel December
last year buy Ian and Jue
On 27/09/16 13:13, Sven Köhler wrote:
> Am 27.09.2016 um 07:31 schrieb Juergen Gross:
>> On 27/09/16 00:48, Sven Köhler wrote:
>>> Am 26.09.2016 um 07:43 schrieb Juergen Gross:
On 25/09/16 18:04, Sven Köhler wrote:
> Hi,
>
> I'm experiencing the bug below which was discussed on xen
flight 101166 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101166/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
When building Mini-OS with an app which is using xen libraries like
libxenguest.a let mini-os_app.o depend on the library binaries as it
is statically linked with them.
While at it add "-T" before app.lds for linking mini-os_app.o to avoid
a linker warning.
Signed-off-by: Juergen Gross
---
Make
Am 27.09.2016 um 14:02 schrieb Juergen Gross:
> On 27/09/16 13:13, Sven Köhler wrote:
>> Am 27.09.2016 um 07:31 schrieb Juergen Gross:
>>> On 27/09/16 00:48, Sven Köhler wrote:
Am 26.09.2016 um 07:43 schrieb Juergen Gross:
> On 25/09/16 18:04, Sven Köhler wrote:
>> Hi,
>>
>> I'
On 27/09/16 14:09, Sven Köhler wrote:
> Am 27.09.2016 um 14:02 schrieb Juergen Gross:
>> On 27/09/16 13:13, Sven Köhler wrote:
>>> Am 27.09.2016 um 07:31 schrieb Juergen Gross:
On 27/09/16 00:48, Sven Köhler wrote:
> Am 26.09.2016 um 07:43 schrieb Juergen Gross:
>> On 25/09/16 18:04, S
On 26/09/16 08:34, Jan Beulich wrote:
>
>> 0F6F was previously ImplicitOps|ModRM, but looks like it should be ModRM
>> like the rest of 0F6x. 0F7F, 0FC7 and 0FE7 similarly.
> Why? As mentioned elsewhere I think the (otherwise benign)
> ImplicitOps (as well as the individual DstImplicit and SrcImp
This run is configured for baseline tests only.
flight 67769 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67769/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-insta
On 15/09/16 07:55, Jan Beulich wrote:
On 14.09.16 at 19:56, wrote:
>> On 08/09/16 14:14, Jan Beulich wrote:
>>> int __get_instruction_length_from_list(struct vcpu *v,
>>> const enum instruction_index *list, unsigned int list_count)
>>> {
>>> struct vmcb_struct *vmcb = v->arch.
>>> On 26.09.16 at 18:12, wrote:
> On Mon, Sep 26, 2016 at 12:24 AM, Jan Beulich wrote:
> On 23.09.16 at 22:45, wrote:
>>> On Fri, Sep 23, 2016 at 9:50 AM, Tamas K Lengyel
>>> wrote:
On Fri, Sep 23, 2016 at 9:39 AM, Jan Beulich wrote:
On 23.09.16 at 17:26, wrote:
>> On F
>>> On 27.09.16 at 15:42, wrote:
> On 15/09/16 07:55, Jan Beulich wrote:
> On 14.09.16 at 19:56, wrote:
>>> On 08/09/16 14:14, Jan Beulich wrote:
int __get_instruction_length_from_list(struct vcpu *v,
const enum instruction_index *list, unsigned int list_count)
{
>>>
flight 101165 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101165/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7807dea57fba6a019bb8641572e0159ffa03ad9e
baseline version:
ovmf 324dd9b468fc53c1b1620
>>> On 27.09.16 at 15:28, wrote:
> On 26/09/16 08:34, Jan Beulich wrote:
>>
>>> 0F6F was previously ImplicitOps|ModRM, but looks like it should be ModRM
>>> like the rest of 0F6x. 0F7F, 0FC7 and 0FE7 similarly.
>> Why? As mentioned elsewhere I think the (otherwise benign)
>> ImplicitOps (as well
On 15/09/16 07:43, Jan Beulich wrote:
On 14.09.16 at 19:30, wrote:
>>> @@ -435,6 +438,51 @@ struct x86_emulate_ctxt
>>> void *data;
>>> };
>>>
>>> +/*
>>> + * This encodes the opcode extension in a "natural" way:
>> I am not sure what you mean by natural way here. All you seem to mea
I will be dusting off Linux domU PVHv2 patches now that ACPI changes are
getting close to being accepted.
Last version of that patch referred to these guests as 'hvmlite',
including in names of variables, routines etc. I was hesitant to remove
"classic" PVH code and use "pvh" instead of "hvmlite"
The COPYING file in the main xen.git tree applies to most files in the
xen tree, including the ones in this patch. It states:
[1]
* Note that the only valid version of the GPL as far as the files in
* this repository are concerned is _this_ particular version of the
* license (i.e., *only* v2,
On 27/09/16 15:08, Boris Ostrovsky wrote:
> I will be dusting off Linux domU PVHv2 patches now that ACPI changes are
> getting close to being accepted.
>
> Last version of that patch referred to these guests as 'hvmlite',
> including in names of variables, routines etc. I was hesitant to remove
>
This run is configured for baseline tests only.
flight 67767 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67767/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-migrupgrade 9 xen-boot/src_ho
On 9/26/16 3:53 PM, nimisha agarwal wrote:
> Hello,
> I wish to take part in the Outreach Program this time. The
> second project that interest me is *Code Standards Checking using
> clang-format. *I am currently looking through clang-format so I could
> get to know how to use it.
> To get starte
On Tue, Sep 27, 2016 at 03:19:32PM +0100, David Vrabel wrote:
> On 27/09/16 15:08, Boris Ostrovsky wrote:
> > I will be dusting off Linux domU PVHv2 patches now that ACPI changes are
> > getting close to being accepted.
> >
> > Last version of that patch referred to these guests as 'hvmlite',
> >
Hey!
If the guest is booted with 'pci' we nicely expand the MMIO region below
4GB and try to fit in the BARs in there. If that fails (not enough
space) we move it above the memory (64-bit). And throughout all of this
we also update the _CRS field to cover these ranges.
(Note, I need to check if t
On 27/09/16 16:19, David Vrabel wrote:
> On 27/09/16 15:08, Boris Ostrovsky wrote:
>> I will be dusting off Linux domU PVHv2 patches now that ACPI changes are
>> getting close to being accepted.
>>
>> Last version of that patch referred to these guests as 'hvmlite',
>> including in names of variabl
Some code (specifically, introduced by commit 801d469ad ("[HVM] ACPI
support patch 3 of 4: ACPI _PRT table.")) has only been licensed under
GPLv2. We want to prevent this code from showing up in non-GPL
binaries which might become possible after we make ACPI builder code
available to users other th
flight 67770 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67770/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-armhf-daily-netboot-pygrub 9 debian-di-install fail blocked
in 67732
test-a
On 09/27/2016 04:20 AM, Fam Zheng wrote:
> 9c5ce8db2 switched the type of qemu_uuid and this should have followed.
> Fix it.
>
> Signed-off-by: Fam Zheng
> ---
> hw/xenpv/xen_domainbuild.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
Reviewed-by: Eric Blake
>
> diff --git a/hw/xen
On Tue, Sep 27, 2016 at 09:22:37AM -0500, Doug Goldstein wrote:
> On 9/26/16 3:53 PM, nimisha agarwal wrote:
> > Hello,
> > I wish to take part in the Outreach Program this time. The
> > second project that interest me is *Code Standards Checking using
> > clang-format. *I am currently looking th
Estimate the size of ACPI tables and reserve a memory map space for ACPI
tables.
Signed-off-by: Shannon Zhao
---
tools/libxl/libxl_arm_acpi.c | 100 +++
xen/include/acpi/actbl1.h| 2 +
2 files changed, 102 insertions(+)
diff --git a/tools/libxl/libx
flight 101164 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101164/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt-qcow2 6 xen-boot fail in 101159 pass in 101164
test-armhf-armhf-xl-credit2 15 g
This run is configured for baseline tests only.
flight 67771 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67771/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 333ba578fef4dff8921051410c5b56f63e7eeadb
baseline v
Add macros for HVM_PARAM_CALLBACK_TYPE_PPI operation values and update
them in evtchn_fixup().
Also use HVM_PARAM_CALLBACK_IRQ_TYPE_MASK in hvm_set_callback_via().
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Shannon Zhao
---
xen/arch/arm/domain_build.c | 9 ++---
xen/arch/x86/hvm
On Tue, Sep 27, 2016 at 03:16:50PM +0100, Lars Kurth wrote:
> The COPYING file in the main xen.git tree applies to most files in the
> xen tree, including the ones in this patch. It states:
>
> [1]
> * Note that the only valid version of the GPL as far as the files in
> * this repository are con
On Tue, Sep 27, 2016 at 10:46:18AM -0400, Boris Ostrovsky wrote:
> Some code (specifically, introduced by commit 801d469ad ("[HVM] ACPI
> support patch 3 of 4: ACPI _PRT table.")) has only been licensed under
> GPLv2. We want to prevent this code from showing up in non-GPL
> binaries which might be
On 27/09/16 14:56, Jan Beulich wrote:
On 27.09.16 at 15:42, wrote:
>> On 15/09/16 07:55, Jan Beulich wrote:
>> On 14.09.16 at 19:56, wrote:
On 08/09/16 14:14, Jan Beulich wrote:
> int __get_instruction_length_from_list(struct vcpu *v,
> const enum instruction_index
On Tue, Sep 27, 2016 at 02:06:24PM +0200, Juergen Gross wrote:
> When building Mini-OS with an app which is using xen libraries like
> libxenguest.a let mini-os_app.o depend on the library binaries as it
> is statically linked with them.
>
> While at it add "-T" before app.lds for linking mini-os_
Hello,
This is the first "complete" PVHv2 implementation in the sense that
it has feature parity with classic PVH Dom0. It is still very experimental,
but I've managed to boot it on all Intel boxes I've tried (OK, only 3 so far).
I've also tried on an AMD box, but sadly the ACPI tables there didn'
Return should be an int, and the number of pages should be an unsigned long.
Signed-off-by: Roger Pau Monné
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Tim Deegan
---
xen/arch/x86/mm/hap/hap.c | 6 +++---
xen/arch/x86/mm/shadow/common.c | 7 +++
xen/include/asm-x8
So that it can also be used by the PVH-specific domain builder. This is just
code motion, it should not introduce any functional change.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/domain_build.c | 164 +++-
1 fi
On PVHv2 guests we explicitly want to use native methods for routing
interrupts.
Introduce a new XEN_X86_EMU_USE_PIRQ to notify Xen whether a HVM guest can
route physical interrupts (even from emulated devices) over event channels.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew C
Introduce a new %pB format specifier to print sizes (in bytes) in a
human-readable form.
Signed-off-by: Roger Pau Monné
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
docs/misc/printk
This is also required for PVHv2 guests if they want to use real-mode, and
hvmloader is not executed for those kind of guests.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Ian Jackson
Cc: Wei Liu
---
tools/firmware/hvmloader/hvmloader.c | 17 -
tool
Allow the use of both the emulated local APIC and IO APIC for the hardware
domain.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since RFC:
- Move the emulation flags check to a separate helper.
---
xen/arch/x86/domain.c | 28 +---
1
It doesn't make sense since the idle domain doesn't receive any events.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/include/asm-x86/event.h | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xen/include/asm-x86/event.h b/xen/include/asm-x86/event.h
index a8
... and introduce a floor variant.
Signed-off-by: Roger Pau Monné
---
Cc: Stefano Stabellini
Cc: Julien Grall
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Boris Ostrovsky
Cc: Suravee Suthikulpanit
Cc: Konrad Rzeszutek Wilk
---
xen/arch/arm/domain.c| 2 +-
xen/arch/arm/domain
Because it's also going to be used by other code.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
---
xen/drivers/passthrough/pci.c | 86 ++-
1 file changed, 53 insertions(+), 33 deletions(-)
diff --git a/xen/drivers/passthrough/pci.c b/xen/drivers/pa
Initialize Dom0 BSP/APs and setup the memory and IO permissions.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
The logic used to setup the CPUID leaves is extremely simplistic (and
probably wrong for hardware different than mine). I'm not sure what's the
best way to d
Most of this code has been picked up from QEMU and modified so it can be
plugged into the internal Xen IO handlers. The structure of the handlers has
been keep quite similar to QEMU, so existing handlers can be imported
without a lot of effort.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Signed-off-by: Roger Pau Monné
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/mm/p2m.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index 44492ae..c989b60 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/domain_build.c | 26 ++
1 file changed, 26 insertions(+)
diff --git a/xen/arch/x86/domain_build.c b/xen/arch/x86/domain_build.c
index 407f742..b4a14a3 100644
--- a/xen/arch/x86/domain_
This is very similar to the PCI trap used for the traditional PV(H) Dom0.
Signed-off-by: Roger Pau Monné
---
Cc: Paul Durrant
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/io.c | 72 ++-
xen/arch/x86/traps.c | 39 --
Craft the Dom0 e820 memory map and populate it.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since RFC:
- Use IS_ALIGNED instead of checking with PAGE_MASK.
- Use the new %pB specifier in order to print sizes in human readable form.
- Create a VM86 TSS for
Xen already allows setting the store event channel, and this parameter is
not used by Xen at all.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/hvm.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
This maps all the regions in the e820 marked as E820_ACPI or E820_NVS and
the top-level ACPI tables discovered by Xen to Dom0 1:1. It also shadows the
page(s) where the native MADT is placed by mapping a RAM page over it,
copying the original data and modifying it afterwards in order to represent
t
Instead of being tied to the presence of an IOMMU
Signed-off-by: Roger Pau Monné
Suggested-by: Andrew Cooper
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Suravee Suthikulpanit
Cc: Kevin Tian
Cc: Feng Wu
---
xen/arch/x86/setup.c| 2 ++
xen/drivers/passthrough/amd/pci_am
Introduce a helper to parse the Dom0 kernel.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/domain_build.c | 138
1 file changed, 138 insertions(+)
diff --git a/xen/arch/x86/domain_build.c b/xen/arch/x86/domai
So that it can be called from the Dom0 builder.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/e820.c| 2 +-
xen/include/asm-x86/e820.h | 1 +
2 files changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/e
Add a new MMIO handler that traps accesses to PCIe regions, as discovered by
Xen from the MCFG ACPI table. The handler used is the same as the one used
for accesses to the IO PCI configuration space.
Signed-off-by: Roger Pau Monné
---
Cc: Paul Durrant
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen
The current msixtbl intercepts only partially trap MSI-X accesses, but are
not complete, there's missing logic in order to setup PIRQs and bind them to
domains. Disable them for domains without at least an ioreq server (PVH).
Signed-off-by: Roger Pau Monné
---
Cc: Paul Durrant
Cc: Jan Beulich
C
Split the Dom0 builder into two different functions, one for PV (and classic
PVH), and another one for PVHv2. Introduce a new command line parameter,
dom0hvm in order to request the creation of a PVHv2 Dom0.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since
The current code used by Intel VTd will only map RMRR regions for the
hardware domain, but will fail to map RMRR regions for unprivileged domains
unless the page tables are shared between EPT and IOMMU. Fix this and
simplify the code, removing the {set/clear}_identity_p2m_entry helpers and
just usi
This requires adding handlers to the PCI configuration space, plus a MMIO
handler for the MSI-X table, the PBA is left mapped directly into the guest.
The implementation is based on the one already found in the passthrough
code from QEMU.
Signed-off-by: Roger Pau Monné
---
Paul Durrant
Jan Beuli
This is done adding some Dom0 specific logic to the IO APIC emulation inside
of Xen, so that writes to the IO APIC registers that should unmask an
interrupt will take care of setting up this interrupt with Xen. A Dom0
specific EIO handler also has to be used, since Xen doesn't know the
topology of
... and remove hap_set_alloc_for_pvh_dom0.
Signed-off-by: Roger Pau Monné
Acked-by: Tim Deegan
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Tim Deegan
---
Changes since RFC:
- Make paging_set_allocation preemtable.
- Move comments.
---
xen/arch/x86/domain_build.c | 17 +
Import the MSI handlers from QEMU into Xen. This allows Xen to detect
accesses to the MSI registers and correctly setup PIRQs for physical devices
that are then bound to the hardware domain.
The current logic only allows the usage of a single MSI interrupt per
device, so the maximum queue size ann
Add handlers to detect attemps from a PVHv2 Dom0 to change the position of
the PCI BARs and properly remap them.
Signed-off-by: Roger Pau Monné
---
Cc: Paul Durrant
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/io.c | 2 +
xen/drivers/passthrough/pci.c | 307 +++
On 2016/9/27 2:41, Wei Liu wrote:
On Mon, Sep 26, 2016 at 02:54:55PM -0700, Shannon Zhao wrote:
On 2016/9/22 7:10, Wei Liu wrote:
diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
index 2924629..118beab 100644
--- a/tools/libxl/libxl_dom.c
+++ b/tools/libxl/libxl_dom.c
@@ -408
On 27/09/16 17:56, Wei Liu wrote:
> On Tue, Sep 27, 2016 at 02:06:24PM +0200, Juergen Gross wrote:
>> When building Mini-OS with an app which is using xen libraries like
>> libxenguest.a let mini-os_app.o depend on the library binaries as it
>> is statically linked with them.
>>
>> While at it add
... and using the "preempted" parameter. The solution relies on just calling
softirq_pending if the current domain is the idle domain.
Signed-off-by: Roger Pau Monné
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/mm/hap/hap.c | 4 +++-
1 file changed, 3 insertions(+)
On 27/09/2016 16:35, "Konrad Rzeszutek Wilk"
wrote:
>On Tue, Sep 27, 2016 at 03:16:50PM +0100, Lars Kurth wrote:
>> The COPYING file in the main xen.git tree applies to most files in the
>> xen tree, including the ones in this patch. It states:
>>
>> [1]
>> * Note that the only valid version
On Tue, Sep 27, 2016 at 06:03:28PM +0200, Juergen Gross wrote:
> On 27/09/16 17:56, Wei Liu wrote:
> > On Tue, Sep 27, 2016 at 02:06:24PM +0200, Juergen Gross wrote:
> >> When building Mini-OS with an app which is using xen libraries like
> >> libxenguest.a let mini-os_app.o depend on the library b
Juergen Gross, on Tue 27 Sep 2016 14:06:24 +0200, wrote:
> When building Mini-OS with an app which is using xen libraries like
> libxenguest.a let mini-os_app.o depend on the library binaries as it
> is statically linked with them.
>
> While at it add "-T" before app.lds for linking mini-os_app.o
On Tue, Sep 27, 2016 at 09:01:00AM -0700, Shannon Zhao wrote:
>
>
> On 2016/9/27 2:41, Wei Liu wrote:
> >On Mon, Sep 26, 2016 at 02:54:55PM -0700, Shannon Zhao wrote:
> >>
> >>
> >>On 2016/9/22 7:10, Wei Liu wrote:
> diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
> >index
Signed-off-by: Wei Liu
---
.gitignore | 3 +++
Makefile | 10 +-
2 files changed, 12 insertions(+), 1 deletion(-)
diff --git a/.gitignore b/.gitignore
index f69e7fc..28c7874 100644
--- a/.gitignore
+++ b/.gitignore
@@ -11,3 +11,6 @@
/selftests/test-*
/tests/*/test-*
/tests/*/info.j
Hi Konrad,
On 21/09/2016 10:32, Konrad Rzeszutek Wilk wrote:
The patch piggybacks on: livepatch: Initial ARM64 support, which
brings up all of the necessary livepatch infrastructure pieces in.
This patch adds three major pieces:
1) ELF relocations. ARM32 uses SHT_REL instead of SHT_RELA which
1 - 100 of 146 matches
Mail list logo