[Xen-devel] [PATCH V2 9/25] tools/libxl: build DMAR table for a guest with one virtual VTD

2017-08-09 Thread Lan Tianyu
From: Chao Gao A new logic is added to build ACPI DMAR table in tool stack for a guest with one virtual VTD and pass through it to guest via existing mechanism. If there already are ACPI tables needed to pass through, we joint the tables. Signed-off-by: Chao Gao Signed-off-by: Lan Tianyu ---

[Xen-devel] [PATCH V2 25/25] x86/vvtd: save and restore emulated VT-d

2017-08-09 Thread Lan Tianyu
From: Chao Gao Wrap some useful status in a new structure hvm_hw_vvtd, following the customs of vlapic, vioapic and etc. Provide two save-restore pairs to save/restore registers and non-register status. Signed-off-by: Chao Gao Signed-off-by: Lan Tianyu --- xen/drivers/passthrough/vtd/vvtd.c

[Xen-devel] [PATCH V2 19/25] x86/vioapic: extend vioapic_get_vector() to support remapping format RTE

2017-08-09 Thread Lan Tianyu
From: Chao Gao When IOAPIC RTE is in remapping format, it doesn't contain the vector of interrupt. For this case, the RTE contains an index of interrupt remapping table where the vector of interrupt is stored. This patchs gets the vector through a vIOMMU interface. Signed-off-by: Chao Gao Signe

[Xen-devel] [PATCH V2 22/25] x86/vmsi: Hook delivering remapping format msi to guest

2017-08-09 Thread Lan Tianyu
From: Chao Gao In two situations, hypervisor delivers a msi to a hvm guest. One is when qemu sends a request to hypervisor through XEN_DMOP_inject_msi. The other is when a physical interrupt arrives and it has been bound to a guest msi. For the former, the msi is routed to common vIOMMU layer if

[Xen-devel] [PATCH V2 1/3] i386/msi: Correct mask of destination ID in MSI address

2017-08-09 Thread Lan Tianyu
From: Chao Gao According to SDM 10.11.1, only [19:12] bits of MSI address are Destination ID, change the mask to avoid ambiguity for VT-d spec has used the bit 4 to indicate a remappable interrupt request. Signed-off-by: Chao Gao Signed-off-by: Lan Tianyu Reviewed-by: Anthony PERARD Reviewed-

[Xen-devel] [PATCH V2 3/3] msi: Handle remappable format interrupt request

2017-08-09 Thread Lan Tianyu
From: Chao Gao According to VT-d spec Interrupt Remapping and Interrupt Posting -> Interrupt Remapping -> Interrupt Request Formats On Intel 64 Platforms, fields of MSI data register have changed. This patch avoids wrongly regarding a remappable format interrupt request as an interrupt binded wit

[Xen-devel] [PATCH V2 2/3] xen-pt: bind/unbind interrupt remapping format MSI

2017-08-09 Thread Lan Tianyu
From: Chao Gao If a vIOMMU is exposed to guest, guest will configure the msi to remapping format. The original code isn't suitable to the new format. A new pair bind/unbind interfaces are added for this usage. This patch recognizes this case and uses new interfaces to bind/unbind msi. Signed-off

[Xen-devel] [PATCH v2 0/3] Qemu: Add Xen vIOMMU interrupt remapping function support

2017-08-09 Thread Lan Tianyu
This patchset is to deal with MSI interrupt remapping request when guest updates MSI registers. Chao Gao (3): i386/msi: Correct mask of destination ID in MSI address xen-pt: bind/unbind interrupt remapping format MSI msi: Handle remappable format interrupt request configure

[Xen-devel] [ovmf test] 112539: all pass - PUSHED

2017-08-09 Thread osstest service owner
flight 112539 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112539/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 7ef0dae092afcfb6fab7e8372c78097672168c4a baseline version: ovmf 7111e46fdebca0e03f6dd

Re: [Xen-devel] [PATCH RESEND1 00/12] ALSA: vsnd: Add Xen para-virtualized frontend driver

2017-08-09 Thread Takashi Sakamoto
Hi, On Aug 7 2017 21:22, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko This patch series adds support for Xen [1] para-virtualized sound frontend driver. It implements the protocol from include/xen/interface/io/sndif.h with the following limitations: - mute/unmute is not support

[Xen-devel] [xen-unstable test] 112536: tolerable trouble: blocked/broken/fail/pass - PUSHED

2017-08-09 Thread osstest service owner
flight 112536 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/112536/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail REGR. vs. 112526 Tests which did not succeed

[Xen-devel] [ovmf baseline-only test] 71957: all pass

2017-08-09 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71957 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71957/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 7ef0dae092afcfb6fab7e8372c78097672168c4a baseline v

<    1   2   3