On 05/09/2024 11:41, Andrew Cooper wrote:
STDVGA caching is primarily (exclusively?) an optimisation for Windows XP.
I think it was originally for Win2K (white splash screen).
Paul
On 04/09/2024 09:21, Roger Pau Monné wrote:
In the absence of that I'm afraid it is a little harder to
judge whether the proposal here is the best we can do at this point.
While I don't mind looking at what we can do to better handle 4K
sector disks, we need IMO to revert to the specification b
On 02/09/2024 16:23, Roger Pau Monné wrote:
On Mon, Sep 02, 2024 at 03:19:56PM +0100, Paul Durrant wrote:
On 02/09/2024 09:55, Roger Pau Monné wrote:
[snip]
Thanks for your input. I would also like to hear from the blktap and
Windows PV drivers maintainers, as the change that I'm prop
On 02/09/2024 09:55, Roger Pau Monné wrote:
[snip]
Thanks for your input. I would also like to hear from the blktap and
Windows PV drivers maintainers, as the change that I'm proposing here
will require changes to their implementations.
So IIUC you are proposing to refuse to connect to a fro
t val)
d->shutdown_code = SHUTDOWN_crash;
spin_unlock(&d->shutdown_lock);
-gprintk(XENLOG_WARNING, "VIRIDIAN CRASH: %lx %lx %lx %lx %lx\n",
+gprintk(XENLOG_WARNING,
+"VIRIDIAN GUEST_CRASH: %#lx %#lx %#lx %#lx %#l
| 2 +-
xen/arch/x86/hvm/viridian/viridian.c| 4 ++--
xen/arch/x86/include/asm/hvm/vmx/vmcs.h | 17 +++--
xen/arch/x86/traps.c| 5 +++--
4 files changed, 17 insertions(+), 11 deletions(-)
Viridian changes...
Acked-by: Paul Durrant
: Gerd Hoffmann
---
include/ui/surface.h| 4 ++--
hw/display/qxl-render.c | 2 +-
hw/display/vga.c| 20 ++--
hw/display/xenfb.c | 5 +++--
ui/console.c| 3 ++-
5 files changed, 18 insertions(+), 16 deletions(-)
Reviewed-by: Paul Durrant
alized
the vga_interface_type variable.
Signed-off-by: Philippe Mathieu-Daudé
---
include/hw/xen/xen-legacy-backend.h | 3 ---
hw/display/xenfb.c | 9 +++--
hw/xenpv/xen_machine_pv.c | 2 --
3 files changed, 7 insertions(+), 7 deletions(-)
Reviewed-by: Paul Durrant
kend.c | 16
6 files changed, 20 insertions(+), 38 deletions(-)
Reviewed-by: Paul Durrant
(+), 7 deletions(-)
Reviewed-by: Paul Durrant
| 4 ++--
4 files changed, 9 insertions(+), 9 deletions(-)
Reviewed-by: Paul Durrant
(-)
Reviewed-by: Paul Durrant
On 10/05/2024 11:49, Philippe Mathieu-Daudé wrote:
XenDevOps @ops is not updated, mark it const.
Signed-off-by: Philippe Mathieu-Daudé
---
include/hw/xen/xen_pvdev.h | 2 +-
hw/xen/xen-legacy-backend.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
Reviewed-by: Paul Durrant
;xen_console_ops' in commit 9b77374690 ("hw/xen: update Xen
console to XenDevice model"). Remove them.
Signed-off-by: Philippe Mathieu-Daudé
---
include/hw/xen/xen-legacy-backend.h | 3 ---
1 file changed, 3 deletions(-)
Reviewed-by: Paul Durrant
continue processing them. This lets
QEMU go back to the main loop and catch up.
Signed-off-by: Ross Lagerwall
---
hw/xen/xen-hvm-common.c | 26 +-
1 file changed, 17 insertions(+), 9 deletions(-)
Reviewed-by: Paul Durrant
On 08/04/2024 14:00, Ross Lagerwall wrote:
On Sat, Apr 6, 2024 at 11:58 AM Durrant, Paul wrote:
On 04/04/2024 15:08, Ross Lagerwall wrote:
A malicious or buggy guest may generated buffered ioreqs faster than
QEMU can process them in handle_buffered_iopage(). The result is a
livelock - QEMU co
On 25/03/2024 12:21, Jesper Dangaard Brouer wrote:
Hi Arthur,
(Answer inlined below, which is custom on this mailing list)
On 23/03/2024 14.23, Arthur Borsboom wrote:
Hi Jesper,
After a recent kernel upgrade 6.7.6 > 6.8.1 all my Xen guests on Arch
Linux are dumping kernel traces.
It seems to
From: Paul Durrant
I am not as actively involved with the Xen project as I once was so I need
to relinquish some of my maintainer responsibilities: IOMMU and I/O
emulation.
NOTE: Since I am sole maintainer for I/O EMULATION (IOREQ) and
X86 I/O EMULATION, these sections are removed
On 13/02/2024 11:21, Breno Leitao wrote:
W=1 builds now warn if module is built without a MODULE_DESCRIPTION().
Add descriptions to the Xen backend network module.
Signed-off-by: Breno Leitao
---
drivers/net/xen-netback/netback.c | 1 +
1 file changed, 1 insertion(+)
Acked-by: Paul
entinel... it's
just a question of having a #define for it).
Either way...
Acked-by: Paul Durrant
--- a/xen/arch/x86/hvm/emulate.c
+++ b/xen/arch/x86/hvm/emulate.c
@@ -696,7 +696,12 @@ static void *hvmemul_map_linear_addr(
out:
/* Drop all held references. */
k (or otherwise)?
Thanks, Jan
Yes, no objections.
Acked-by: Paul Durrant
--- a/xen/arch/x86/guest/hyperv/hyperv.c
+++ b/xen/arch/x86/guest/hyperv/hyperv.c
@@ -207,7 +207,7 @@ static int cf_check flush_tlb(
return hyperv_flush_tlb(mask, va, flags);
}
-static const struct hypervisor_ops
y xenvif_tx_build_gops() works
precludes an ADD and a DEL coming together in a single dummy request
(the DEL would be ignored).
It appears the Solaris backend never coped with multiple extra_info so
what the 'correct' semantic would be is unclear.
Anyway...
Reviewed-by: Paul Durrant
On 01/02/2024 00:23, Jakub Kicinski wrote:
On Mon, 29 Jan 2024 14:03:08 +0100 Jan Beulich wrote:
Invoking the make_tx_response() / push_tx_responses() pair with no lock
held would be acceptable only if all such invocations happened from the
same context (NAPI instance or dealloc thread). Since t
| 53 ++-
xen/arch/x86/tboot.c | 2 +-
5 files changed, 3 insertions(+), 61 deletions(-)
Reviewed-by: Paul Durrant
ase.
x86/iommu: add CHANGELOG entry for hwdom setup time improvements
Signed-off-by: Roger Pau Monné
Reviewed-by: Paul Durrant
/x86/include/asm/hvm/io.h | 3 ++
xen/arch/x86/include/asm/setup.h| 1 +
xen/arch/x86/setup.c| 48 +++
xen/drivers/passthrough/x86/iommu.c | 61 +
5 files changed, 129 insertions(+)
Reviewed-by: Paul Durrant
: add option to disable legacy
backends"
- Do not move xenstore global variable from xen-legacy-backend.c,
instead use a local variable.
---
accel/xen/xen-all.c | 16
1 file changed, 12 insertions(+), 4 deletions(-)
Reviewed-by: Paul Durrant
/test-replication.c | 11 --
util/async.c | 4 -
util/vhost-user-server.c | 3 -
scripts/block-coroutine-wrapper.py | 3 -
tests/tsan/suppressions.tsan | 1 -
41 files changed, 102 insertions(+), 1202 deletions(-)
Reviewed-by: Paul Durrant
ons(+), 25 deletions(-)
Reviewed-by: Paul Durrant
les changed, 502 insertions(+), 502 deletions(-)
Reviewed-by: Paul Durrant
On 23/11/2023 12:27, David Woodhouse wrote:
On 23 November 2023 12:17:57 GMT, Volodymyr Babchuk
wrote:
Hi David,
David Woodhouse writes:
Which PV backends do you care about? We already have net, block and console
converted.
Well, this is all what we need, actually. Even console only wil
On 22/11/2023 23:04, David Woodhouse wrote:
On Wed, 2023-11-22 at 22:56 +, Volodymyr Babchuk wrote:
Paul Durrant writes:
On 21/11/2023 22:10, Volodymyr Babchuk wrote:
From: David Woodhouse
This allows a XenDevice implementation to know whether it was
created
by QEMU, or merely
at 14:29 -0800, Stefano Stabellini wrote:
On Wed, 22 Nov 2023, Paul Durrant wrote:
On 21/11/2023 22:10, Volodymyr Babchuk wrote:
From: Oleksandr Tyshchenko
Instead of forcing the owner to domid 0, use XS_PRESERVE_OWNER to
inherit the owner of the directory.
Ah... so that's why the pre
On 21/11/2023 22:10, Volodymyr Babchuk wrote:
From: Oleksandr Tyshchenko
Instead of forcing the owner to domid 0, use XS_PRESERVE_OWNER to
inherit the owner of the directory.
Ah... so that's why the previous patch is there.
This is not the right way to fix it. The QEMU Xen support is *assumi
On 21/11/2023 22:10, Volodymyr Babchuk wrote:
Add option to preserve owner when creating an entry in Xen Store. This
may be needed in cases when Qemu is working as device model in a
*may* be needed?
I don't undertstand why this patch is necessary and the commit comment
isn't really helping me
On 21/11/2023 22:10, Volodymyr Babchuk wrote:
From: David Woodhouse
This allows a XenDevice implementation to know whether it was created
by QEMU, or merely discovered in XenStore after the toolstack created
it. This will allow us to create frontend/backend nodes only when we
should, rather tha
On 21/11/2023 22:10, Volodymyr Babchuk wrote:
was created by QEMU
Xen PV devices in QEMU can be created in two ways: either by QEMU
itself, if they were passed via command line, or by Xen toolstack. In
the latter case, QEMU scans XenStore entries and configures devices
accordingly.
In the secon
/xen_nic.c | 2 +-
hw/xen/xen-bus.c | 4
include/hw/xen/xen-backend.h | 2 --
include/hw/xen/xen-bus.h | 2 ++
6 files changed, 9 insertions(+), 6 deletions(-)
Reviewed-by: Paul Durrant
On 15/11/2023 17:24, David Woodhouse wrote:
From: David Woodhouse
If a Xen console is configured on the command line, do not add a default
serial port.
Signed-off-by: David Woodhouse
---
system/vl.c | 1 +
1 file changed, 1 insertion(+)
Reviewed-by: Paul Durrant
de to hopefully make it clearer to Coverity and human reviewers
alike.
Signed-off-by: David Woodhouse
---
hw/block/xen-block.c | 24 +---
1 file changed, 21 insertions(+), 3 deletions(-)
Reviewed-by: Paul Durrant
On 10/11/2023 15:42, Volodymyr Babchuk wrote:
Add option to preserve owner when creating an entry in Xen Store. This
may be needed in cases when Qemu is working as device model in a
domain that is Domain-0, e.g. in driver domain.
"owner" parameter for qemu_xen_xs_create() function can have speci
On 10/11/2023 15:42, Volodymyr Babchuk wrote:
From: Oleksandr Tyshchenko
Both state (XenbusStateClosed) and online (0) are expected by
toolstack/xl devd to completely destroy the device. But "offline"
is never being set by the backend resulting in timeout during
domain destruction, garbage in X
On 10/11/2023 15:42, Volodymyr Babchuk wrote:
From: Oleksandr Tyshchenko
The PV backend running in other than Dom0 domain (non toolstack domain)
is not allowed to write frontend nodes. The more, the backend does not
need to do that at all, this is purely toolstack/xl devd business.
I do not kn
de to hopefully make it clearer to Coverity and human reviewers
alike.
Signed-off-by: David Woodhouse
---
hw/block/xen-block.c | 24 +---
1 file changed, 21 insertions(+), 3 deletions(-)
Reviewed-by: Paul Durrant
.rst | 107 +--
qemu-options.hx | 14 +++--
3 files changed, 91 insertions(+), 32 deletions(-)
Reviewed-by: Paul Durrant
fs
option is set.
Signed-off-by: David Woodhouse
---
docs/sphinx/hxtool.py | 18 +-
docs/system/invocation.rst | 1 +
2 files changed, 18 insertions(+), 1 deletion(-)
Reviewed-by: Paul Durrant
2 +-
hw/i386/pc_q35.c | 2 +-
hw/xen/xen-bus.c | 4 +++-
include/hw/i386/pc.h | 4 +++-
include/hw/xen/xen-bus.h | 2 +-
6 files changed, 17 insertions(+), 8 deletions(-)
Reviewed-by: Paul Durrant
ed, 125 insertions(+), 46 deletions(-)
Reviewed-by: Paul Durrant
using QAPI).
This allows making passthrough devices appear as functions in a Xen
guest.
Signed-off-by: Ross Lagerwall
Reviewed-by: Paul Durrant
On 25/10/2023 10:00, David Woodhouse wrote:
On Wed, 2023-10-25 at 09:31 +0100, Paul Durrant wrote:
On 24/10/2023 17:34, David Woodhouse wrote:
On Tue, 2023-10-24 at 17:25 +0100, Paul Durrant wrote:
On 24/10/2023 16:49, David Woodhouse wrote:
On Tue, 2023-10-24 at 16:39 +0100, Paul Durrant
On 24/10/2023 17:34, David Woodhouse wrote:
On Tue, 2023-10-24 at 17:25 +0100, Paul Durrant wrote:
On 24/10/2023 16:49, David Woodhouse wrote:
On Tue, 2023-10-24 at 16:39 +0100, Paul Durrant wrote:
On 24/10/2023 16:37, David Woodhouse wrote:
On Tue, 2023-10-24 at 15:20 +0100, Paul Durrant
On 24/10/2023 16:49, David Woodhouse wrote:
On Tue, 2023-10-24 at 16:39 +0100, Paul Durrant wrote:
On 24/10/2023 16:37, David Woodhouse wrote:
On Tue, 2023-10-24 at 15:20 +0100, Paul Durrant wrote:
On 16/10/2023 16:19, David Woodhouse wrote:
From: David Woodhouse
The primary console is
On 24/10/2023 16:48, David Woodhouse wrote:
On Tue, 2023-10-24 at 16:44 +0100, Paul Durrant wrote:
On 19/10/2023 16:40, David Woodhouse wrote:
From: David Woodhouse
On soft reset, the prinary console event channel needs to be rebound to
the backend port (in the xen-console driver). We could
On 24/10/2023 16:17, David Woodhouse wrote:
[snip]
I don't think that's really a valid state for a network frontend. Linux
netback just ignores it.
Must we? I was thinking of making the ->frontend_changed() methods
optional and allowing backends to just provide ->connect() and
->disconnect() m
On 19/10/2023 16:40, David Woodhouse wrote:
From: David Woodhouse
On soft reset, the prinary console event channel needs to be rebound to
the backend port (in the xen-console driver). We could put that into the
xen-console driver itself, but it's slightly less ugly to keep it within
the KVM/Xen
On 24/10/2023 16:37, David Woodhouse wrote:
On Tue, 2023-10-24 at 15:20 +0100, Paul Durrant wrote:
On 16/10/2023 16:19, David Woodhouse wrote:
From: David Woodhouse
The primary console is special because the toolstack maps a page at a
fixed GFN and also allocates the guest-side event channel
ts to *rebind* to the event channel port after a reset.
Signed-off-by: David Woodhouse
---
hw/i386/kvm/xen_xenstore.c | 11 +++
1 file changed, 11 insertions(+)
Reviewed-by: Paul Durrant
On 19/10/2023 16:40, David Woodhouse wrote:
From: David Woodhouse
When fire_watch_cb() found the response buffer empty, it would call
deliver_watch() to generate the XS_WATCH_EVENT message in the response
buffer and send an event channel notification to the guest… without
actually *copying* the
: de26b2619789 ("hw/xen: Implement soft reset for emulated gnttab")
Signed-off-by: David Woodhouse
---
hw/i386/kvm/xen_gnttab.c | 2 --
1 file changed, 2 deletions(-)
Reviewed-by: Paul Durrant
+++
3 files changed, 14 insertions(+)
Reviewed-by: Paul Durrant
On 17/10/2023 19:25, David Woodhouse wrote:
From: David Woodhouse
Signed-off-by: David Woodhouse
---
hw/net/meson.build| 2 +-
hw/net/trace-events | 9 +
hw/net/xen_nic.c | 426 +-
hw/xenpv/xen_machine_pv.c | 1 -
4 files c
On 17/10/2023 19:25, David Woodhouse wrote:
From: David Woodhouse
When the Xen guest asks to unplug *emulated* NICs, it's kind of unhelpful
also to unplug the peer of the *Xen* PV NIC.
Signed-off-by: David Woodhouse
---
hw/i386/xen/xen_platform.c | 9 +++--
1 file changed, 7 insertions
On 16/10/2023 16:19, David Woodhouse wrote:
From: David Woodhouse
The primary console is special because the toolstack maps a page at a
fixed GFN and also allocates the guest-side event channel. Add support
for that in emulated mode, so that we can have a primary console.
Add a *very* rudiment
On 16/10/2023 16:19, David Woodhouse wrote:
From: David Woodhouse
Ensure that we have a XenBackendInstance for every device regardless
of whether it was "discovered" in XenStore or created directly in QEMU.
This allows the backend_list to be a source of truth about whether a
given backend exis
On 24/10/2023 14:29, David Woodhouse wrote:
On Tue, 2023-10-24 at 13:59 +0100, Paul Durrant wrote:
On 24/10/2023 13:56, David Woodhouse wrote:
On Tue, 2023-10-24 at 13:42 +0100, Paul Durrant wrote:
--- a/hw/xen/xen-bus.c
+++ b/hw/xen/xen-bus.c
@@ -711,8 +711,16 @@ static void
/xen-backend.h | 1 +
3 files changed, 24 insertions(+), 7 deletions(-)
Reviewed-by: Paul Durrant
|= xencons_send(con);
}
+return done_something;
+}
-path = g_string_new(dom_path);
-free(dom_path);
+/* */
-if (con->xendev.dev) {
-g_string_append_printf(path, "/device/console/%d", con->xendev.dev);
-} else {
-g_string_append(path, "/console");
+static void xen_console_disconnect(XenDevice *xendev, Error **errp)
+{
+XenConsole *con = XEN_CONSOLE_DEVICE(xendev);
+
+qemu_chr_fe_set_handlers(&con->chr, NULL, NULL, NULL, NULL,
+ con, NULL, true);
+
nit: extraneous blank line by the looks of it.
With that fixed...
Reviewed-by: Paul Durrant
On 24/10/2023 13:56, David Woodhouse wrote:
On Tue, 2023-10-24 at 13:42 +0100, Paul Durrant wrote:
--- a/hw/xen/xen-bus.c
+++ b/hw/xen/xen-bus.c
@@ -711,8 +711,16 @@ static void xen_device_frontend_create(XenDevice *xendev,
Error **errp)
{
ERRP_GUARD();
XenBus *xenbus
On 16/10/2023 16:19, David Woodhouse wrote:
From: David Woodhouse
The primary Xen console is special. The guest's side is set up for it by
the toolstack automatically and not by the standard PV init sequence.
Accordingly, its *frontend* doesn't appear in …/device/console/0 either;
instead it a
allow guests to *rebind* to the event channel port after a reset.
... although this can also be done by querying the remote end of the
port before reset.
Signed-off-by: David Woodhouse
---
hw/i386/kvm/xen_xenstore.c | 10 ++
1 file changed, 10 insertions(+)
Reviewed-by: Paul Durrant
(+)
Reviewed-by: Paul Durrant
/interface/vcpu.h | 19 +--
include/hw/xen/interface/version.h| 19 +--
include/hw/xen/interface/xen-compat.h | 19 +--
include/hw/xen/interface/xen.h| 19 +--
29 files changed, 124 insertions(+), 523 deletions(-)
Acked-by: Paul
On 16/10/2023 16:18, David Woodhouse wrote:
From: David Woodhouse
A guest which has configured the per-vCPU upcall vector may set the
HVM_PARAM_CALLBACK_IRQ param to fairly much anything other than zero.
For example, Linux v6.0+ after commit b1c3497e604 ("x86/xen: Add support
for HVMOP_set_evt
d, 2 insertions(+), 3 deletions(-)
Reviewed-by: Paul Durrant
direction which necessitates
this patch.
Signed-off-by: David Kahurani
Acked-by: Paul Durrant
late.c | 2 +-
xen/arch/x86/hvm/io.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
Acked-by: Paul Durrant
2 +-
xen/include/xen/ioreq.h | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
Acked-by: Paul Durrant
ynic.c | 2 +-
xen/arch/x86/hvm/viridian/time.c | 10 +-----
2 files changed, 6 insertions(+), 6 deletions(-)
Reviewed-by: Paul Durrant
yperv-tlfs.h | 28 ++--
2 files changed, 15 insertions(+), 15 deletions(-)
Reviewed-by: Paul Durrant
/plug.c | 109 +++---
hw/block/dataplane/xen-block.c| 10 +--
hw/block/virtio-blk.c | 4 +-
hw/scsi/virtio-scsi.c | 6 +-
9 files changed, 76 insertions(+), 79 deletions(-)
Reviewed-by: Paul Durrant
/xen/xen_platform.c | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
Reviewed-by: Paul Durrant
1 deletion(-)
Reviewed-by: Paul Durrant
include/asm/hvm/io.h | 14 +++---
2 files changed, 11 insertions(+), 11 deletions(-)
Reviewed-by: Paul Durrant
f-by: Anthony PERARD
---
hw/block/xen-block.c | 11 ++-
1 file changed, 6 insertions(+), 5 deletions(-)
Reviewed-by: Paul Durrant
On 25/05/2023 16:25, Olaf Hering wrote:
Introduced in commit 6ddfaabceeec3c31bc97a7208c46f581de55f71d
("x86/hvm/ioreq: simplify code and use consistent naming").
Signed-off-by: Olaf Hering
---
xen/arch/x86/hvm/ioreq.c | 1 -
1 file changed, 1 deletion(-)
Reviewed-by: Paul Durrant
On 24/04/2023 14:17, Tim Smith wrote:
On Mon, Apr 24, 2023 at 1:08 PM Mark Syms wrote:
Copying in Tim who did the final phase of the changes.
On Mon, 24 Apr 2023 at 11:32, Paul Durrant wrote:
On 20/04/2023 12:02, mark.s...@citrix.com wrote:
From: Mark Syms
Ensure the PV ring is drained
: Anthony Perard
CC: Paul Durrant
CC: xen-devel@lists.xenproject.org
v2:
* Ensure all inflight requests are completed before teardown
* RESEND to fix formatting
---
hw/block/dataplane/xen-block.c | 31 +--
1 file changed, 25 insertions(+), 6 deletions(-)
diff
David Woodhouse
Signed-off-by: Stefan Hajnoczi
---
hw/i386/kvm/xen_xenstore.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Reviewed-by: Paul Durrant
David Woodhouse
---
hw/i386/kvm/xen_xenstore.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Reviewed-by: Paul Durrant
("hw/xen: Move xenstore_store_pv_console_info to
xen_console.c")
Signed-off-by: David Woodhouse
---
hw/char/xen_console.c | 13 +++--
1 file changed, 3 insertions(+), 10 deletions(-)
Reviewed-by: Paul Durrant
ve.h | 107 +---
meson.build | 5 +-
scripts/xen-detect.c| 60
4 files changed, 3 insertions(+), 226 deletions(-)
Reviewed-by: Paul Durrant
: Add xenstore operations to allow redirection to
internal emulation")
Suggested-by: Peter Maydell
Signed-off-by: David Woodhouse
Reviewed-by: Peter Maydell
Reviewed-by: Paul Durrant
s, as
XEN_RING_NR_UNCONSUMED_REQUESTS() is taking unsent responses into
consideration, too.
Remove the tests.
Suggested-by: Jan Beulich
Signed-off-by: Juergen Gross
---
drivers/net/xen-netback/netback.c | 4
1 file changed, 4 deletions(-)
Reviewed-by: Paul Durrant
2 files changed, 24 insertions(+), 3 deletions(-)
Reviewed-by: Paul Durrant
. Add the missing call to setup_xen_backend_ops().
Fixes: b6cacfea0b38 ("hw/xen: Add evtchn operations to allow redirection to internal
emulation")
Reported-by: Anthony PERARD
Signed-off-by: David Woodhouse
---
hw/xenpv/xen_machine_pv.c | 2 ++
1 file changed, 2 insertions(+)
Reviewe
On 20/03/2023 10:34, Jan Beulich wrote:
On 20.03.2023 10:04, Paul Durrant wrote:
On 17/03/2023 10:32, David Woodhouse wrote:
From: David Woodhouse
The emulated PIIX3 uses a nybble for the status of each PCI function,
so the status for e.g. slot 0 functions 0 and 1 respectively can be
read as
On 17/03/2023 10:32, David Woodhouse wrote:
From: David Woodhouse
The emulated PIIX3 uses a nybble for the status of each PCI function,
so the status for e.g. slot 0 functions 0 and 1 respectively can be
read as (\_GPE.PH00 & 0x0F), and (\_GPE.PH00 >> 0x04).
The AML that Xen gives to a guest g
Andryuk
---
accel/xen/xen-all.c | 27 ++-
1 file changed, 10 insertions(+), 17 deletions(-)
Reviewed-by: Paul Durrant
tion of XenStore operations
hw/xen: Map guest XENSTORE_PFN grant in emulated Xenstore
hw/xen: Implement soft reset for emulated gnttab
i386/xen: Initialize Xen backends from pc_basic_device_init() for
emulation
MAINTAINERS: Add entry for Xen on KVM emulation
docs:
device xen-disk,drive=disk,vdev=xvda
If we use -M pc instead of q35, we can even add an IDE disk and boot a
guest image normally through grub. But q35 gives us AHCI and that isn't
unplugged by the Xen magic, so the guests ends up seeing "both" disks.
Signed-off-by: David Woodhouse
1 - 100 of 3500 matches
Mail list logo