Hi Wei,
On 03/17/2017 06:51 AM, Wei Chen wrote:
Hi Stefano,
On 2017/3/17 7:17, Stefano Stabellini wrote:
On Thu, 16 Mar 2017, Julien Grall wrote:
On 03/16/2017 10:40 PM, Stefano Stabellini wrote:
On Wed, 15 Mar 2017, Wei Chen wrote:
Hi Stefano,
On 2017/3/15 8:25, Stefano Stabellini wrote:
Hi. I'm not using xen for past 4 years (switched to kvm) but now i'm
interesting - does it possible to reboot (for update) dom0 ?
As i know, xen stubdoms can dedicate network, disk and xenstored to
external domains. Does it possible to reboot dom0 ?
--
Vasiliy Tolstov,
e-mail: v.tols...@selfip.r
>>> On 17.03.17 at 02:29, wrote:
> On 17-03-16 05:20:35, Jan Beulich wrote:
>> >>> On 16.03.17 at 12:07, wrote:
>> > Acked and Reviewed list before V9:
>> >
>> > a - Acked-by
>> > r - Reviewed-by
>> >
>> > r patch 1 - docs: create Cache Allocation Technology (CAT) and Code and
>> >
* Thomas Garnier wrote:
> On Thu, Mar 16, 2017 at 1:10 AM, Ingo Molnar wrote:
> >
> > Note that asm/fixmap.h is an x86-ism that isn't present in many other
> > architectures, so this hunk will break the build.
> >
> > To make progress with these patches I've fixed it up with an ugly #ifdef
> >
>>> On 16.03.17 at 22:30, wrote:
> --- a/xen/common/schedule.c
> +++ b/xen/common/schedule.c
> @@ -78,7 +78,19 @@ static struct scheduler __read_mostly ops;
>: (typeof((opsptr)->fn(opsptr, ##__VA_ARGS__)))0 )
>
> #define DOM2OP(_d)(((_d)->cpupool == NULL) ? &ops :
> ((_d)->cpup
>>> On 16.03.17 at 20:35, wrote:
> --- a/xen/arch/x86/time.c
> +++ b/xen/arch/x86/time.c
> @@ -2051,17 +2051,12 @@ void tsc_set_info(struct domain *d,
> d->arch.vtsc_offset = get_s_time() - elapsed_nsec;
> d->arch.tsc_khz = gtsc_khz ?: cpu_khz;
> set_time_scale(&d->arch.
On 17/03/17 08:09, Vasiliy Tolstov wrote:
> Hi. I'm not using xen for past 4 years (switched to kvm) but now i'm
> interesting - does it possible to reboot (for update) dom0 ?
> As i know, xen stubdoms can dedicate network, disk and xenstored to
> external domains. Does it possible to reboot dom0 ?
2017-03-17 11:21 GMT+03:00 Juergen Gross :
> Not yet.
Does this planned or how can i do that if i can write some code ? =)
--
Vasiliy Tolstov,
e-mail: v.tols...@selfip.ru
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-de
After related patch merged by Xen, qemu side patch got
some comments to change the API in qemu community.
So we update Xen side codes.
Qemu patchs:
https://lists.nongnu.org/archive/html/qemu-devel/2017-02/msg07654.html
Zhang Chen (2):
libxl/libxl_qmp.c: Update COLO do checkpoint API
libxl/li
Because of qemu side patch changed the API that comment by community,
So we fix it in Xen side.
Signed-off-by: Zhang Chen
---
tools/libxl/libxl_colo_restore.c | 2 +-
tools/libxl/libxl_colo_save.c| 3 ++-
tools/libxl/libxl_internal.h | 2 +-
tools/libxl/libxl_qmp.c | 4 ++--
4 f
Because of qemu side patch changed the API that comment by community,
So we fix it in Xen side.
Signed-off-by: Zhang Chen
---
tools/libxl/libxl_colo_restore.c | 2 +-
tools/libxl/libxl_colo_save.c| 2 +-
tools/libxl/libxl_internal.h | 2 +-
tools/libxl/libxl_qmp.c | 5 +++--
4 f
On 17/03/17 09:23, Vasiliy Tolstov wrote:
> 2017-03-17 11:21 GMT+03:00 Juergen Gross :
>> Not yet.
>
>
> Does this planned or how can i do that if i can write some code ? =)
(Dropping xen-users)
I have plans for the future, but I'm not sure when I'll have enough
time for it.
Any help on this t
2017-03-17 11:47 GMT+03:00 Juergen Gross :
> (Dropping xen-users)
>
> I have plans for the future, but I'm not sure when I'll have enough
> time for it.
>
> Any help on this topic is welcome, of course!
>
> I think (at least) the following features are missing:
>
> - capability to specify a (new) d
On Thu, Mar 16, 2017 at 04:29:29AM -0600, Jan Beulich wrote:
On 15.03.17 at 23:39, wrote:
>> On Wed, Mar 15, 2017 at 10:48:25AM -0600, Jan Beulich wrote:
>> On 15.03.17 at 06:11, wrote:
+/*
+ * The following method to update IRTE is safe on condition that
+
On 17/03/17 09:49, Vasiliy Tolstov wrote:
> 2017-03-17 11:47 GMT+03:00 Juergen Gross :
>> (Dropping xen-users)
>>
>> I have plans for the future, but I'm not sure when I'll have enough
>> time for it.
>>
>> Any help on this topic is welcome, of course!
>>
>> I think (at least) the following feature
On 03/10/2017 08:50 AM, Jan Beulich wrote:
On 10.03.17 at 09:29, wrote:
On 03/09/2017 10:34 AM, Jan Beulich wrote:
On 08.03.17 at 18:46, wrote:
Sorry for the long delay since the first version of this series
(previously called "Make building xSplice patches easier"). Here is a
set of change
On Thu, 2017-03-16 at 11:23 -0700, Krish Sadhukhan wrote:
> The Intel SDM also mentions POP-SS. Are you planning to do it via
> another patch ?
(SDM from Dec 2016) In "Table 24-3. Format of Interruptibility State"
it reads "This document uses the term “blocking by MOV SS,” but it
applies equally
>>> On 17.03.17 at 02:52, wrote:
> On Thu, Mar 16, 2017 at 04:29:29AM -0600, Jan Beulich wrote:
> On 15.03.17 at 23:39, wrote:
>>> On Wed, Mar 15, 2017 at 10:48:25AM -0600, Jan Beulich wrote:
>>> On 15.03.17 at 06:11, wrote:
> +/*
> + * The following method to upd
>>> On 17.03.17 at 09:57, wrote:
> On 03/10/2017 08:50 AM, Jan Beulich wrote:
> On 10.03.17 at 09:29, wrote:
>>> They would be
>>> removed only for "release" builds in which it is likely that the source
>>> code & debuginfo is archived somewhere such that looking up a line
>>> number requires
Currently use of xen-hvmcrash will cause an immediate domain_crash() in
initialize_vp_assist() because it is called from viridian_load_vcpu_ctxt()
without having first cleared any previous mapping.
This patch makes initialize_vp_assist() responsible for clearing previous
mappings, if necessary.
S
The Hypervisor Top Level Functional Specification v5.0a states in section
2.5:
"The hypervisor version information is encoded in leaf 0x4002. Two
version numbers are provided: the main version and the service version.
The main version includes a major and minor version number and a build
numbe
Section 2.4.4 of the Hypervisor Top Level Functional Specification states
that enabling bit 10 in EDX of CPUID leaf 3 advertises to Windows a set
of MSRs into which it can write crash information.
This patch advertises that bit and implements the MSRs such that Xen can
log the information if a Win
The current threshold before the guest issues the hypercall is, and always
has been, hard-coded to 2047. It is not clear where this number came
from so, to at least allow for ease of experimentation, this patch makes
the threshold tunable via the Xen command line.
Signed-off-by: Paul Durrant
---
The Hypervisor Top Level Functional Specification v5.0a has many differences
from previous versions and introduces whole new sections.
This patch:
- Updates the URL at the top of the source.
- Fixes up section references accordingly.
- Modifies the MSR naming convention in the code to match the s
The numbers correspond to ASCII characters so just use appropriate
character strings directly.
Signed-off-by: Paul Durrant
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/viridian.c | 10 ++
1 file changed, 6 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/hvm/virid
These warnings can be useful when Microsoft updates Windows.
In the past there have been several cases when Windows erroneously uses
hypercalls and MSRs that should be gated on CPUID flags than Xen does
not set. The usual symptom is a guest crash with little or no information
in the hypervisor log
flight 106735 rumprun real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106735/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
rumprun e5207b247d4d87f68a91ae3e03d600d2a6265177
baseline version:
rumprun bbfbaf4b590443a3d8
Paul Durrant (7):
x86/viridian: update to version 5.0a of the specification
x86/viridian: fix xen-hvmcrash when vp_assist page is present
x86/viridian: don't put Xen version information in CPUID leaf 2
x86/viridian: get rid of the magic numbers in CPUID leaves 1 and 2
x86/viridian: add wa
On Thu, Mar 16, 2017 at 06:21:16PM +, Wei Liu wrote:
> On Thu, Mar 16, 2017 at 06:16:26PM +, Roger Pau Monné wrote:
> > On Thu, Mar 16, 2017 at 05:54:57PM +, Wei Liu wrote:
> > [...]
> > > diff --git a/xen/arch/x86/dom0_build.c b/xen/arch/x86/dom0_build.c
> > > index c74f9b52e0..772f077
Commit 436fb462ab ("x86/microcode: enable boot time (pre-Dom0)
loading") added a 4th module without providing an array slot for it.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/efi/efi-boot.h
+++ b/xen/arch/x86/efi/efi-boot.h
@@ -13,7 +13,7 @@ static struct file __initdata ucode;
static multib
On Fri, Mar 17, 2017 at 09:56:44AM +0100, Juergen Gross wrote:
> On 17/03/17 09:49, Vasiliy Tolstov wrote:
> > 2017-03-17 11:47 GMT+03:00 Juergen Gross :
> >> (Dropping xen-users)
> >>
> >> I have plans for the future, but I'm not sure when I'll have enough
> >> time for it.
> >>
> >> Any help on t
On 17/03/17 10:06, Jan Beulich wrote:
> Commit 436fb462ab ("x86/microcode: enable boot time (pre-Dom0)
> loading") added a 4th module without providing an array slot for it.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel maili
> -Original Message-
> From: Jennifer Herbert [mailto:jennifer.herb...@citrix.com]
> Sent: 16 March 2017 14:44
> To: Xen-devel
> Cc: Jennifer Herbert ; Jan Beulich
> ; Ian Jackson ; Wei Liu
> ; Andrew Cooper ; Paul
> Durrant
> Subject: [PATCH] dm_op: Add xendevicemodel_modified_memory_bul
>>> On 15.03.17 at 06:11, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -445,6 +445,9 @@ static int hvm_migrate_pirq(struct domain *d, struct
> hvm_pirq_dpci *pirq_dpci,
> struct vcpu *v = arg;
>
> if ( (pirq_dpci->flags & HVM_IRQ_DPCI_MACH_MSI) &&
> +
On Fri, Mar 17, 2017 at 04:42:31PM +0800, Zhang Chen wrote:
> Because of qemu side patch changed the API that comment by community,
> So we fix it in Xen side.
>
> Signed-off-by: Zhang Chen
Code-wise this patch looks OK, but I can't parse the commit message.
May I suggest you change the commit
On Fri, Mar 17, 2017 at 04:42:32PM +0800, Zhang Chen wrote:
> Because of qemu side patch changed the API that comment by community,
> So we fix it in Xen side.
Maybe:
The QEMU community has asked us to change QMP command
xen-get-replication-error to query-xen-replication-status. Modify Xen
side t
>>> On 15.03.17 at 06:11, wrote:
> The current logic of using VT-d pi is when guest configurates the pirq's
> destination vcpu to a single vcpu, the according IRTE is updated to
> posted format. If the destination of the pirq is multiple vcpus, we just use
> interrupt remapping. Obviously, we shou
On Fri, Mar 17, 2017 at 04:42:30PM +0800, Zhang Chen wrote:
> After related patch merged by Xen, qemu side patch got
> some comments to change the API in qemu community.
> So we update Xen side codes.
>
> Qemu patchs:
> https://lists.nongnu.org/archive/html/qemu-devel/2017-02/msg07654.html
>
>
>
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/dom0_build.c | 4
1 file changed, 4 deletions(-)
diff --git a/xen/arch/x86/pv/dom0_build.c b/xen/arch/x86/pv/dom0_build.c
index bb82c33a4c..6872b30209 100644
--- a/xen/arch/x86/pv/dom0_build.c
+++ b/xen/arch/x86/pv/dom0_build.c
@@ -872,10 +872,6 @@
... to match the code after the removal of PVHv1.
Signed-off-by: Wei Liu
---
docs/designs/dmop.markdown | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/designs/dmop.markdown b/docs/designs/dmop.markdown
index a6cf6eb67b..8e9f95af47 100644
--- a/docs/designs/dmop.markdown
Built on top my series to split dom0 builder.
Wei Liu (4):
docs: update dmop.markdown
sched.h: remove stale PVHv1 comment
x86/traps: undo the PVHv1 bodge in NMI delivery path
x86: remove stale PVHv1 comment from PV domain builder
docs/designs/dmop.markdown | 2 +-
xen/arch/x86/pv/dom0_
A bodge was added in 21c9fce8efb to skip delivering NMI to PVHv1 guest.
Now that PVHv1 is gone, undo that bodge and remove the fixme.
Signed-off-by: Wei Liu
---
xen/arch/x86/traps.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
in
With the removal of PVHv1 this comment is wrong. Just remove it.
Signed-off-by: Wei Liu
---
xen/include/xen/sched.h | 4
1 file changed, 4 deletions(-)
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 832352a5ce..325733a4b8 100644
--- a/xen/include/xen/sched.h
+++ b/xen
>>> On 10.03.17 at 16:50, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -3645,6 +3645,41 @@ gp_fault:
> return X86EMUL_EXCEPTION;
> }
>
> +int hvm_descriptor_access_intercept(uint64_t exit_info, uint64_t
> exit_qualification,
> +
>>> On 17.03.17 at 12:02, wrote:
> Built on top my series to split dom0 builder.
>
> Wei Liu (4):
> docs: update dmop.markdown
> sched.h: remove stale PVHv1 comment
> x86/traps: undo the PVHv1 bodge in NMI delivery path
> x86: remove stale PVHv1 comment from PV domain builder
Acked-by: J
On 17/03/17 11:02, Wei Liu wrote:
> A bodge was added in 21c9fce8efb to skip delivering NMI to PVHv1 guest.
> Now that PVHv1 is gone, undo that bodge and remove the fixme.
>
> Signed-off-by: Wei Liu
This unfortunately needs to stay, although perhaps it wants rewording.
send_guest_trap() just out
On 17/03/17 11:05, Jan Beulich wrote:
On 17.03.17 at 12:02, wrote:
>> Built on top my series to split dom0 builder.
>>
>> Wei Liu (4):
>> docs: update dmop.markdown
>> sched.h: remove stale PVHv1 comment
>> x86/traps: undo the PVHv1 bodge in NMI delivery path
>> x86: remove stale PVHv
flight 106742 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106742/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 5 ker
On Thu, 16 Mar 2017 13:01:50 -0700
Stefano Stabellini wrote:
> Change Makefile.objs to use CONFIG_XEN instead of CONFIG_XEN_BACKEND, so
> that the Xen backends are only built for targets that support Xen.
>
> Set CONFIG_XEN in the toplevel Makefile to ensure that files that are
> built only once
On Fri, Mar 17, 2017 at 11:06:41AM +, Andrew Cooper wrote:
> On 17/03/17 11:02, Wei Liu wrote:
> > A bodge was added in 21c9fce8efb to skip delivering NMI to PVHv1 guest.
> > Now that PVHv1 is gone, undo that bodge and remove the fixme.
> >
> > Signed-off-by: Wei Liu
>
> This unfortunately ne
On 16/03/2017 21:01, Stefano Stabellini wrote:
> Change Makefile.objs to use CONFIG_XEN instead of CONFIG_XEN_BACKEND, so
> that the Xen backends are only built for targets that support Xen.
>
> Set CONFIG_XEN in the toplevel Makefile to ensure that files that are
> built only once pick up Xen s
On 17/03/17 11:10, Wei Liu wrote:
> On Fri, Mar 17, 2017 at 11:06:41AM +, Andrew Cooper wrote:
>> On 17/03/17 11:02, Wei Liu wrote:
>>> A bodge was added in 21c9fce8efb to skip delivering NMI to PVHv1 guest.
>>> Now that PVHv1 is gone, undo that bodge and remove the fixme.
>>>
>>> Signed-off-by
On Fri, Mar 17, 2017 at 11:11:17AM +, Andrew Cooper wrote:
> On 17/03/17 11:10, Wei Liu wrote:
> > On Fri, Mar 17, 2017 at 11:06:41AM +, Andrew Cooper wrote:
> >> On 17/03/17 11:02, Wei Liu wrote:
> >>> A bodge was added in 21c9fce8efb to skip delivering NMI to PVHv1 guest.
> >>> Now that P
On Thu, 16 Mar 2017 13:01:51 -0700
Stefano Stabellini wrote:
> Do not use the ring.h header installed on the system. Instead, import
> the header into the QEMU codebase. This avoids problems when QEMU is
> built against a Xen version too old to provide all the ring macros.
>
> Signed-off-by: Ste
On 16/03/17 17:54, Wei Liu wrote:
> diff --git a/xen/arch/x86/pv/dom0_build.c b/xen/arch/x86/pv/dom0_build.c
> new file mode 100644
> index 00..bb82c33a4c
> --- /dev/null
> +++ b/xen/arch/x86/pv/dom0_build.c
> @@ -0,0 +1,910 @@
> +/***
On Thu, 16 Mar 2017 13:01:52 -0700
Stefano Stabellini wrote:
> Use the new type in virtio-9p-device.
>
> Signed-off-by: Stefano Stabellini
> CC: anthony.per...@citrix.com
> CC: jgr...@suse.com
> CC: Aneesh Kumar K.V
> CC: Greg Kurz
> ---
Reviewed-by: Greg Kurz
> hw/9pfs/9p.h
On Fri, Mar 17, 2017 at 11:15:45AM +, Andrew Cooper wrote:
> On 16/03/17 17:54, Wei Liu wrote:
> > diff --git a/xen/arch/x86/pv/dom0_build.c b/xen/arch/x86/pv/dom0_build.c
> > new file mode 100644
> > index 00..bb82c33a4c
> > --- /dev/null
> > +++ b/xen/arch/x86/pv/dom0_build.c
> > @@ -
On Fri, Mar 17, 2017 at 11:10:19AM +, Wei Liu wrote:
> On Fri, Mar 17, 2017 at 11:06:41AM +, Andrew Cooper wrote:
> > On 17/03/17 11:02, Wei Liu wrote:
> > > A bodge was added in 21c9fce8efb to skip delivering NMI to PVHv1 guest.
> > > Now that PVHv1 is gone, undo that bodge and remove the
flight 106729 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106729/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 11 guest-start fail REGR. vs. 59254
test-armhf-armhf-xl
On Thu, Mar 16, 2017 at 5:31 PM, Julien Grall wrote:
> On 03/15/2017 08:05 PM, Oleksandr Tyshchenko wrote:
>>
>> Hi, all.
>
>
> Hi Oleksandr,
Hi Julien
>
> Thank you for looking at the support of "non-shared" page table IOMMU
> support.
>
>>
>> The purpose of this patch series is to create a bas
On Thu, Mar 16, 2017 at 5:39 PM, Julien Grall wrote:
> Hi Oleksandr,
Hi Julien
>
> On 03/15/2017 08:05 PM, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> Port Linux helper of_count_phandle_with_args for counting
>> number of phandles in a property.
>>
>> Signed-off-by: Oleks
>>> On 17.03.17 at 12:14, wrote:
> --- a/xen/arch/x86/traps.c
> +++ b/xen/arch/x86/traps.c
> @@ -3537,7 +3537,7 @@ static void nmi_hwdom_report(unsigned int reason_idx)
> {
> struct domain *d = hardware_domain;
>
> -if ( !d || !d->vcpu || !d->vcpu[0] || !is_pv_domain(d) /* PVH fixme */
On Fri, Mar 17, 2017 at 05:26:07AM -0600, Jan Beulich wrote:
> >>> On 17.03.17 at 12:14, wrote:
> > --- a/xen/arch/x86/traps.c
> > +++ b/xen/arch/x86/traps.c
> > @@ -3537,7 +3537,7 @@ static void nmi_hwdom_report(unsigned int reason_idx)
> > {
> > struct domain *d = hardware_domain;
> >
>
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Wei Liu
> Sent: 17 March 2017 11:02
> To: Xen-devel
> Cc: Andrew Cooper ; Wei Liu
> ; Jan Beulich ; Roger Pau Monne
>
> Subject: [Xen-devel] [PATCH 1/4] docs: update dmop.markdown
>
> ... to ma
On 17/03/17 11:29, Wei Liu wrote:
> On Fri, Mar 17, 2017 at 05:26:07AM -0600, Jan Beulich wrote:
> On 17.03.17 at 12:14, wrote:
>>> --- a/xen/arch/x86/traps.c
>>> +++ b/xen/arch/x86/traps.c
>>> @@ -3537,7 +3537,7 @@ static void nmi_hwdom_report(unsigned int reason_idx)
>>> {
>>> struct d
On 17/03/17 11:30, Paul Durrant wrote:
>> -Original Message-
>> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
>> Wei Liu
>> Sent: 17 March 2017 11:02
>> To: Xen-devel
>> Cc: Andrew Cooper ; Wei Liu
>> ; Jan Beulich ; Roger Pau Monne
>>
>> Subject: [Xen-devel] [PATC
This patchset is to introduce vIOMMU framework and add virtual VTD's
interrupt remapping support according "Xen virtual IOMMU high level
design doc V3"(https://lists.xenproject.org/archives/html/xen-devel/
2016-11/msg01391.html).
- vIOMMU framework
New framework provides viommu_ops and help functi
This patch is to add get_irq_info callback for platform implementation
to convert irq remapping request to irq info (E,G vector, dest, dest_mode
and so on).
Signed-off-by: Lan Tianyu
---
xen/common/viommu.c | 11 +++
xen/include/asm-arm/viommu.h | 4
xen/include/asm-x86/vi
This patch is to add irq request callback for platform implementation
to deal with irq remapping request.
Signed-off-by: Lan Tianyu
---
xen/common/viommu.c | 11 +++
xen/include/asm-arm/viommu.h | 4
xen/include/asm-x86/viommu.h | 15 +++
xen/include/xen/viommu
From: Chao Gao
The BIOS reports the remapping hardware units in a platform to system software
through the DMA Remapping Reporting (DMAR) ACPI table.
To build DMAR table during domain construction, two fields are added to struct
acpi_config. One is dmar_flag which indicates whether interrupt rema
From: Chao Gao
In previous patch, we introduce a common vIOMMU layer. In our design,
we create/destroy vIOMMU through DMOP interface instead of creating it
according to a config flag of domain. It makes it is possible
to create vIOMMU in device model or in tool stack.
The following toolstack cod
This patch is to introduce create, destroy and query capabilities
command for vIOMMU. vIOMMU layer will deal with requests and call
arch vIOMMU ops.
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/dm.c | 29 +
xen/include/public/hvm/dm_op.h | 39 ++
On Fri, Mar 17, 2017 at 11:31:45AM +, Andrew Cooper wrote:
> On 17/03/17 11:29, Wei Liu wrote:
> > On Fri, Mar 17, 2017 at 05:26:07AM -0600, Jan Beulich wrote:
> > On 17.03.17 at 12:14, wrote:
> >>> --- a/xen/arch/x86/traps.c
> >>> +++ b/xen/arch/x86/traps.c
> >>> @@ -3537,7 +3537,7 @@ sta
From: Chao Gao
Add dmar table structure according Chapter 8 "BIOS Considerations" of
VTd spec Rev. 2.4.
VTd
spec:http://www.intel.com/content/dam/www/public/us/en/documents/product-specifications/vt-directed-io-spec.pdf
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
tools/libacpi/acp
From: Chao Gao
Only add create/destroy function for the emulated VTD in this patch and adapt
it to common VIOMMU layer. we will add more sub-feature of this emulated VTD.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/Makefile | 1 +
xen/arch/x86/hvm/vvtd.c
From: Chao Gao
a field, viommu_info, is added to struct libxl_domain_build_info. Several
attributes can be specified by guest configuration file for the DMAR table
building and dummy vIOMMU creation.
In domain creation process, a new logic is added to build ACPI DMAR table in
tool stack accordin
This patch is to introduct an abstract layer for arch vIOMMU implementation
to deal with requests from dom0. Arch vIOMMU code needs to provide callback
to perform create, destroy and query capabilities operation.
Signed-off-by: Lan Tianyu
---
xen/common/Makefile | 1 +
xen/common/domai
From: Chao Gao
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/vvtd.c | 22 +-
1 file changed, 21 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/hvm/vvtd.c b/xen/arch/x86/hvm/vvtd.c
index c5df77d..0c49294 100644
--- a/xen/arch/x86/hvm/vvtd.c
From: Chao Gao
When irq remapping enabled, IOAPIC Redirection Entry maybe is in remapping
format. If that, generate a irq_remapping_request and send it to domain.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/Makefile | 1 +
xen/arch/x86/hvm/vioapic.c
From: Chao Gao
When irq remapping enabled, IRE may not contain the vector of interrupt. So, a
new function, vioapic_gsi_vector() is added to translate gsi to vector.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/vioapic.c| 26 ++
xen/ar
From: Chao Gao
When a remapping interrupt request arrives, remapping hardware computes the
interrupt_index per the algorithm described in VTD spec
"Interrupt Remapping Table", interprets the IRTE and generates a remapped
interrupte request.
In this patch, a new function viommu_handle_irq_request
On Fri, Mar 17, 2017 at 11:29:38AM +, Wei Liu wrote:
> On Fri, Mar 17, 2017 at 05:26:07AM -0600, Jan Beulich wrote:
> > >>> On 17.03.17 at 12:14, wrote:
> > > --- a/xen/arch/x86/traps.c
> > > +++ b/xen/arch/x86/traps.c
> > > @@ -3537,7 +3537,7 @@ static void nmi_hwdom_report(unsigned int
> >
From: Chao Gao
Software sets this field to set/update the interrupt remapping table pointer
used by hardware. The interrupt remapping table pointer is specified through
the Interrupt Remapping Table Address (IRTA_REG) register.
This patch emulates this operation and uses some fields of VVTD to t
From: Chao Gao
A new device, xen_viommu, is added to qemu. In xen side, we can inform device
model to create a guest with a vIOMMU device through "-device xen_viommu" when
a viommu has been configurated in guest configuration file. Some specific
parameters are passed through xenstore. Qemu will c
From: Chao Gao
This patch is to add VVTD MMIO handler to deal with MMIO access.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/vvtd.c | 135
1 file changed, 135 insertions(+)
diff --git a/xen/arch/x86/hvm/vvtd.c b/xen/a
From: Chao Gao
Software uses this field to enable/disable interrupt reampping. This patch
emulate IRES field of GCMD.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/vvtd.c | 26 ++
xen/drivers/passthrough/vtd/iommu.h | 3 ++-
2 file
From: Chao Gao
In two situations, hypervisor injects a msi to a hvm guest. One is when qemu
sends a request to hypervisor through XEN_DMOP_inject_msi. The other is when a
physical interrupt arrives and it has been binded to a msi interrupt of guest.
The binding relationship is setup and updated b
From: Chao Gao
No functional change.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/vmsi.c | 4 ++--
xen/drivers/passthrough/io.c | 34 +-
xen/include/xen/hvm/irq.h| 8 ++--
3 files changed, 25 insertions(+), 21 deletions(
From: Chao Gao
Software writes to QIE fields of GCMD to enable or disable queued
invalidations. This patch emulates QIE fields of GCMD.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/vvtd.c | 18 ++
xen/drivers/passthrough/vtd/iommu.h | 3 +
From: Chao Gao
Queued Invalidation Interface is an expanded invalidation interface with
extended capabilities. Hardware implementations report support for queued
invalidation interface through the Extended Capability Register. The queued
invalidation interface uses an Invalidation Queue (IQ), whi
From: Chao Gao
Interrupt translation faults are non-recoverable. When fault is triggered, it
needs to populate fault info to Fault Recording Registers and inject vIOMMU
msi interrupt to notify guest IOMMU driver to deal with faults.
In this patch, the process how hardware handles interrupt trans
From: Chao Gao
Introduce a new guest interrupt type and provide a new interface to Qemu to
setup/update/unbind the new interrupt type.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
tools/libxc/include/xenctrl.h | 17 ++
tools/libxc/xc_domain.c | 55 ++
xen/
From: Chao Gao
If a vIOMMU is exposed to guest, guest will configure the msi to remapping
format. The original code isn't suitable to the new format. A new pair
bind/unbind interfaces are added for this usage. This patch recognizes
this case and use new interfaces to bind/unbind msi.
Signed-off-
From: Chao Gao
As remapping format interrupt has been introduced, the vector in msi remapping
format can also be 0, same as a interrupt is binded with a event channel.
So we can't just use whether vector is 0 or not to judge a msi is binded
to a event channel or not.
This patch takes the msi int
From: Chao Gao
Since adding a dynamic sysbus device is forbidden, so choose TYPE_DEVICE
as parent class.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
hw/xen/Makefile.objs | 1 +
hw/xen/xen_viommu.c | 116 +++
2 files changed, 117 ins
This patchset is to add Xen vIOMMU device model and handle
irq remapping stuffs. Xen vIOMMU emulation is in the Xen hypervisor
and the new device module in Qemu works as hypercall wrappers to
create and destroy vIOMMU in hypervisor.
Xen only supports emulated I440 and so we enable vIOMMU with emul
> -Original Message-
> From: Andrew Cooper
> Sent: 17 March 2017 11:33
> To: Paul Durrant ; Wei Liu ;
> Xen-devel
> Cc: Jan Beulich ; Roger Pau Monne
>
> Subject: Re: [Xen-devel] [PATCH 1/4] docs: update dmop.markdown
>
> On 17/03/17 11:30, Paul Durrant wrote:
> >> -Original Message-
Hi,
This series seems to have some coding style problems. See output below for
more information:
Message-id: 1489750157-17401-1-git-send-email-tianyu@intel.com
Subject: [Qemu-devel] [RFC PATCH 0/4] Qemu: Add Xen vIOMMU support
Type: series
=== TEST SCRIPT BEGIN ===
#!/bin/bash
BASE=base
n=1
On Fri, 2017-03-17 at 06:28 +0100, Juergen Gross wrote:
> On 16/03/17 22:30, Dario Faggioli wrote:
> > [..]
> > Fix this by taking care, in VCPU2OP, of the case
> > when the vcpu is an idle one.
> >
> > Signed-off-by: Dario Faggioli
>
> Reviewed-by: Juergen Gross
>
Thanks. I won't apply this t
flight 106731 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106731/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963
test-amd64-i386-xl-qemuu-
1 - 100 of 160 matches
Mail list logo