flight 106747 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106747/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds15 guest-start/debian.repeat fail REGR. vs. 106732
test-armhf-armhf-libvirt
flight 106745 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106745/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 01eb3f39bbcc5b6474d69cff3922be8eb1856636
baseline version:
ovmf
flight 106744 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106744/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 11 guest-start fail REGR. vs. 59254
flight 106743 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106743/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 106570
On Fri, 17 Mar 2017, Konrad Rzeszutek Wilk wrote:
> On Tue, Mar 14, 2017 at 03:18:35PM -0700, Stefano Stabellini wrote:
> > Define the ring according to the protocol specification, using the new
> > DEFINE_XEN_FLEX_RING_AND_INTF macro.
> >
>
> There is a bit of 9pfs code being posted. Is this
On Fri, 17 Mar 2017, Konrad Rzeszutek Wilk wrote:
> On Tue, Mar 14, 2017 at 03:18:36PM -0700, Stefano Stabellini wrote:
> > Define the ring and request and response structs according to the
> > specification. Use the new DEFINE_XEN_FLEX_RING macro.
>
> Don't want to copy-n-paste some of the
On Fri, 17 Mar 2017, Konrad Rzeszutek Wilk wrote:
> On Tue, Mar 14, 2017 at 03:18:34PM -0700, Stefano Stabellini wrote:
> > This patch introduces macros, structs and functions to handle rings in
> > the format described by docs/misc/pvcalls.markdown and
> > docs/misc/9pfs.markdown. The index page
On Fri, 17 Mar 2017, Paolo Bonzini wrote:
> On 17/03/2017 12:29, Lan Tianyu wrote:
> > This patchset is to add Xen vIOMMU device model and handle
> > irq remapping stuffs. Xen vIOMMU emulation is in the Xen hypervisor
> > and the new device module in Qemu works as hypercall wrappers to
> > create
On Fri, 17 Mar 2017, Konrad Rzeszutek Wilk wrote:
> On Fri, Mar 17, 2017 at 05:54:47AM +0100, Juergen Gross wrote:
> > On 16/03/17 19:03, Stefano Stabellini wrote:
> > > On Thu, 16 Mar 2017, Juergen Gross wrote:
> > >> On 15/03/17 19:44, Stefano Stabellini wrote:
> > >>> On Wed, 15 Mar 2017,
flight 106738 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106738/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-qemut-rhel6hvm-amd 3 host-install(3)broken pass in 106728
test-amd64-i386-libvirt
It being very very basic, also means this scheduler does
not need much support at the tools level (for now).
Basically, just the definition of the symbol of the
scheduler itself and a couple of stubs.
Signed-off-by: Dario Faggioli
---
Cc: Wei Liu
As a (rudimental) way of directing and affecting the
placement logic implemented by the scheduler, support
vCPU hard affinity.
Basically, a vCPU will now be assigned only to a pCPU
that is part of its own hard affinity. If such pCPU(s)
is (are) busy, the vCPU will wait, like it happens
when there
Hello,
This patch series implements what I call the 'null' scheduler.
It's a very simple, very static scheduling posicy that always schedules the
same vCPU(s) on the same pCPU(s). That's it.
If there are less vCPUs than pCPUs, some of the pCPUs are _always_ idle. If
there are more, some vCPUs
In cases where one is absolutely sure that there will be
less vCPUs than pCPUs, having to pay the cose, mostly in
terms of overhead, of an advanced scheduler may be not
desirable.
The simple scheduler implemented here could be a solution.
Here how it works:
- each vCPU is statically assigned to
On Fri, 17 Mar 2017, Juergen Gross wrote:
> On 16/03/17 21:20, Stefano Stabellini wrote:
> > On Thu, 16 Mar 2017, Juergen Gross wrote:
> >> Instead of trying to guess the Xen version to use by compiling various
> >> test programs first just ask the system via pkg-config. Only if it
> >> can't
On 17/03/17 19:19, Dario Faggioli wrote:
> Within context_saved(), we call the context_saved hook,
> and we use VCPU2OP() to determine from what scheduler.
> VCPU2OP uses DOM2OP, which uses d->cpupool, which is
> NULL when d is the idle domain. And in that case,
> DOM2OP just returns ops, the
On 17/03/17 19:19, Dario Faggioli wrote:
> Within context_saved(), we call the context_saved hook,
> and we use VCPU2OP() to determine from what scheduler.
> VCPU2OP uses DOM2OP, which uses d->cpupool, which is
> NULL when d is the idle domain. And in that case,
> DOM2OP just returns ops, the
flight 106737 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106737/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl3 host-install(3)broken REGR. vs. 106652
Clarify and enforce (with ASSERTs) when the function
is called on the idle domain, and explain in comments
what it means and when it is ok to do so.
While there, change the name of the function to a more
self-explanatory one, and do the same to VCPU2OP.
Signed-off-by: Dario Faggioli
Within context_saved(), we call the context_saved hook,
and we use VCPU2OP() to determine from what scheduler.
VCPU2OP uses DOM2OP, which uses d->cpupool, which is
NULL when d is the idle domain. And in that case,
DOM2OP just returns ops, the scheduler of cpupool0.
Therefore, if:
- cpupool0's
Hi,
This is v2 of
https://lists.xen.org/archives/html/xen-devel/2017-03/msg02119.html
It's now two patches. Patch 1 is what I already sent, amended taking into
account Jan's suggesions. It is the actual bugfix and the one that should be
backported.
Patch 2 is basically applying the same
On Fri, 17 Mar 2017, Greg Kurz wrote:
> On Thu, 16 Mar 2017 13:01:56 -0700
> Stefano Stabellini wrote:
>
> > Implement xen_9pfs_init_in/out_iov_from_pdu and
> > xen_9pfs_pdu_vmarshal/vunmarshall by creating new sg pointing to the
> > data on the ring.
> >
> > This is
Commit 82713ec8d2 ("x86: use native RDTSC(P) execution when guest and
host frequencies are the same") left out optimization for PV guests
when host and guest run at the same frequency.
For such a case we should be able not to use virtual TSC regardless
of whether we are runing before or after a
On Fri, 17 Mar 2017, Julien Grall wrote:
> Hi Wei,
>
> On 03/17/2017 06:51 AM, Wei Chen wrote:
> > Hi Stefano,
> >
> > On 2017/3/17 7:17, Stefano Stabellini wrote:
> > > On Thu, 16 Mar 2017, Julien Grall wrote:
> > > > On 03/16/2017 10:40 PM, Stefano Stabellini wrote:
> > > > > On Wed, 15 Mar
On Fri, 17 Mar 2017, Greg Kurz wrote:
> On Thu, 16 Mar 2017 13:01:54 -0700
> Stefano Stabellini wrote:
>
> > Write the limits of the backend to xenstore. Connect to the frontend.
> > Upon connection, allocate the rings according to the protocol
> > specification.
> >
> >
flight 106748 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106748/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 5
On Fri, 17 Mar 2017, Paolo Bonzini wrote:
> On 16/03/2017 21:01, Stefano Stabellini wrote:
> > Change Makefile.objs to use CONFIG_XEN instead of CONFIG_XEN_BACKEND, so
> > that the Xen backends are only built for targets that support Xen.
> >
> > Set CONFIG_XEN in the toplevel Makefile to ensure
Hello all,
I want to share my patches for MiniOS, that enables it to work on
ARM64 platforms.
Initial work was done by Chen Baozi, many thanks to him. I just added
context switching
code and some logic to traps handler plus mapping xenbus page.
You can find those patches at [1]. There are two
On Fri, 17 Mar 2017, Wei Chen wrote:
> Hi Stefano,
> On 2017/3/17 7:30, Stefano Stabellini wrote:
> > On Mon, 13 Mar 2017, Wei Chen wrote:
> >> In the later patches of this series, we want to use the alternative
> >> patching framework to avoid checking serror_op in every entries.
> >> So we
>>> On 16.03.17 at 17:31, wrote:
> It is a pointer, not an array.
>
> No functional change.
>
> Requested-by: Jan Beulich
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
>>> On 16.03.17 at 17:31, wrote:
> Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On March 17, 2017 11:51:03 AM EDT, Dario Faggioli
wrote:
>On Fri, 2017-03-17 at 10:19 -0400, Konrad Rzeszutek Wilk wrote:
>> --- a/tools/libxl/libxl_create.c
>> +++ b/tools/libxl/libxl_create.c
>> @@ -225,7 +225,7 @@ int libxl__domain_build_info_setdefault(libxl__gc
>>
Hi all,
We are pleased to announce another update of Intel GVT-g for Xen.
Intel GVT-g is a full GPU virtualization solution with mediated pass-through,
starting from 4th generation Intel Core(TM) processors with Intel Graphics
processors. A virtual GPU instance is maintained for each VM, with
On Fri, 2017-03-17 at 10:19 -0400, Konrad Rzeszutek Wilk wrote:
> --- a/tools/libxl/libxl_create.c
> +++ b/tools/libxl/libxl_create.c
> @@ -225,7 +225,7 @@ int libxl__domain_build_info_setdefault(libxl__gc
> *gc,
> if (b_info->device_model_version ==
> LIBXL_DEVICE_MODEL_VERSION_NONE)
On 17/03/17 15:16, Jan Beulich wrote:
> When booting straight from EFI, we don't further try to relocate Xen.
> As a result, so far we also didn't avoid the area Xen uses when looking
> for a location to put modules or the kexec area. Introduce a fake
> module slot to deal with that without having
On 17/03/17 15:15, Jan Beulich wrote:
> Commit c9a4a1c419 ("x86/layout: Correct Xen's idea of its own memory
> layout") didn't go far enough with the conversion, causing IOMMU faults
> when memory from that range was handed to a domain. We must not make
> this memory available for allocation (the
On 03/17/2017 10:56 AM, Jan Beulich wrote:
On 17.03.17 at 15:50, wrote:
>> On 03/17/2017 10:24 AM, Jan Beulich wrote:
>> On 17.03.17 at 14:36, wrote:
On 03/17/2017 03:48 AM, Jan Beulich wrote:
On 16.03.17 at 20:35,
>>> On 17.03.17 at 16:13, wrote:
> On 03/17/2017 10:56 AM, Jan Beulich wrote:
> On 17.03.17 at 15:50, wrote:
>>> On 03/17/2017 10:24 AM, Jan Beulich wrote:
>>> On 17.03.17 at 14:36, wrote:
> On
flight 106733 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106733/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 104301
Tests which are
When booting straight from EFI, we don't further try to relocate Xen.
As a result, so far we also didn't avoid the area Xen uses when looking
for a location to put modules or the kexec area. Introduce a fake
module slot to deal with that without having to fiddle with a lot of
code.
Signed-off-by:
Commit c9a4a1c419 ("x86/layout: Correct Xen's idea of its own memory
layout") didn't go far enough with the conversion, causing IOMMU faults
when memory from that range was handed to a domain. We must not make
this memory available for allocation (the change is benign to xen.gz at
this point in
On Fri, Mar 17, 2017 at 05:54:47AM +0100, Juergen Gross wrote:
> On 16/03/17 19:03, Stefano Stabellini wrote:
> > On Thu, 16 Mar 2017, Juergen Gross wrote:
> >> On 15/03/17 19:44, Stefano Stabellini wrote:
> >>> On Wed, 15 Mar 2017, Juergen Gross wrote:
> On 14/03/17 22:22, Stefano Stabellini
On Tue, Mar 14, 2017 at 03:18:34PM -0700, Stefano Stabellini wrote:
> This patch introduces macros, structs and functions to handle rings in
> the format described by docs/misc/pvcalls.markdown and
> docs/misc/9pfs.markdown. The index page (struct __name##_data_intf)
> contains the indexes and the
On Tue, Mar 14, 2017 at 03:18:35PM -0700, Stefano Stabellini wrote:
> Define the ring according to the protocol specification, using the new
> DEFINE_XEN_FLEX_RING_AND_INTF macro.
>
There is a bit of 9pfs code being posted. Is this patch still
up-to-date with that? I am going to assume yes, in
On Tue, Mar 14, 2017 at 03:18:36PM -0700, Stefano Stabellini wrote:
> Define the ring and request and response structs according to the
> specification. Use the new DEFINE_XEN_FLEX_RING macro.
Don't want to copy-n-paste some of the XenBus entries? Or at least
point to them (the docs)?
May I also
>>> On 17.03.17 at 15:50, wrote:
> On 03/17/2017 10:24 AM, Jan Beulich wrote:
> On 17.03.17 at 14:36, wrote:
>>> On 03/17/2017 03:48 AM, Jan Beulich wrote:
>>> On 16.03.17 at 20:35, wrote:
> ---
1: avoid IOMMU faults on [_end,__2M_rwdata_end)
2: avoid Xen image when looking for module/kexec position
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 03/17/2017 10:24 AM, Jan Beulich wrote:
On 17.03.17 at 14:36, wrote:
>> On 03/17/2017 03:48 AM, Jan Beulich wrote:
>> On 16.03.17 at 20:35, wrote:
--- a/xen/arch/x86/time.c
+++ b/xen/arch/x86/time.c
@@ -2051,17
On 17/03/2017 12:29, Lan Tianyu wrote:
> This patchset is to add Xen vIOMMU device model and handle
> irq remapping stuffs. Xen vIOMMU emulation is in the Xen hypervisor
> and the new device module in Qemu works as hypercall wrappers to
> create and destroy vIOMMU in hypervisor.
>
> Xen only
On Thu, Mar 16, 2017 at 05:53:38PM +0800, Wei Chen wrote:
> This patch is based on the implementation of ARM64, it introduces
> alternative runtime patching to ARM32. This allows to patch assembly
> instruction at runtime to either fix hardware bugs or optimize for
> certain hardware features on
>>> On 17.03.17 at 14:36, wrote:
> On 03/17/2017 03:48 AM, Jan Beulich wrote:
> On 16.03.17 at 20:35, wrote:
>>> --- a/xen/arch/x86/time.c
>>> +++ b/xen/arch/x86/time.c
>>> @@ -2051,17 +2051,12 @@ void tsc_set_info(struct domain *d,
>>>
On Fri, Nov 25, 2016 at 07:17:31PM +0100, Dario Faggioli wrote:
> On Mon, 2016-11-21 at 10:04 +0100, Dario Faggioli wrote:
> > On Sat, 2016-11-19 at 12:56 +0200, Pasi Kärkkäinen wrote:
> > > 2) It'd good to create an upstream Wayland bugreport and
> > > investigate
> > > more about why cirrus is
On 03/17/2017 03:48 AM, Jan Beulich wrote:
On 16.03.17 at 20:35, wrote:
>> --- a/xen/arch/x86/time.c
>> +++ b/xen/arch/x86/time.c
>> @@ -2051,17 +2051,12 @@ void tsc_set_info(struct domain *d,
>> d->arch.vtsc_offset = get_s_time() - elapsed_nsec;
>>
This patch adds a command-line option (-xen-domid-restrict) which will
use the new libxendevicemodel API to restrict devicemodel operations to
the specified domid.
This patch also adds a tracepoint to allow successful enabling of the
restriction to be monitored.
Signed-off-by: Paul Durrant
On Thu, 16 Mar 2017 13:01:56 -0700
Stefano Stabellini wrote:
> Implement xen_9pfs_init_in/out_iov_from_pdu and
> xen_9pfs_pdu_vmarshal/vunmarshall by creating new sg pointing to the
> data on the ring.
>
> This is safe as we only handle one request per ring at any given
On Thu, 16 Mar 2017 13:01:54 -0700
Stefano Stabellini wrote:
> Write the limits of the backend to xenstore. Connect to the frontend.
> Upon connection, allocate the rings according to the protocol
> specification.
>
> Initialize a QEMUBH to schedule work upon receiving
flight 106732 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106732/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 106718
On Fri, 2017-03-17 at 01:42 -0600, Jan Beulich wrote:
> > > > On 16.03.17 at 22:30, wrote:
> > +{
> > +struct domain *d = v->domain;
> > +
> > +if ( likely(d->cpupool != NULL) )
> > +return d->cpupool->sched;
> > +
> > +/* v->processor never changes
flight 106736 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106736/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-xsm 3 host-install(3)broken REGR. vs. 106707
flight 106731 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106731/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963
On Fri, 2017-03-17 at 06:28 +0100, Juergen Gross wrote:
> On 16/03/17 22:30, Dario Faggioli wrote:
> > [..]
> > Fix this by taking care, in VCPU2OP, of the case
> > when the vcpu is an idle one.
> >
> > Signed-off-by: Dario Faggioli
>
> Reviewed-by: Juergen Gross
Hi,
This series seems to have some coding style problems. See output below for
more information:
Message-id: 1489750157-17401-1-git-send-email-tianyu@intel.com
Subject: [Qemu-devel] [RFC PATCH 0/4] Qemu: Add Xen vIOMMU support
Type: series
=== TEST SCRIPT BEGIN ===
#!/bin/bash
BASE=base
> -Original Message-
> From: Andrew Cooper
> Sent: 17 March 2017 11:33
> To: Paul Durrant ; Wei Liu ;
> Xen-devel
> Cc: Jan Beulich ; Roger Pau Monne
>
> Subject: Re:
This patchset is to add Xen vIOMMU device model and handle
irq remapping stuffs. Xen vIOMMU emulation is in the Xen hypervisor
and the new device module in Qemu works as hypercall wrappers to
create and destroy vIOMMU in hypervisor.
Xen only supports emulated I440 and so we enable vIOMMU with
From: Chao Gao
As remapping format interrupt has been introduced, the vector in msi remapping
format can also be 0, same as a interrupt is binded with a event channel.
So we can't just use whether vector is 0 or not to judge a msi is binded
to a event channel or not.
This
From: Chao Gao
Since adding a dynamic sysbus device is forbidden, so choose TYPE_DEVICE
as parent class.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
hw/xen/Makefile.objs | 1 +
hw/xen/xen_viommu.c | 116
From: Chao Gao
If a vIOMMU is exposed to guest, guest will configure the msi to remapping
format. The original code isn't suitable to the new format. A new pair
bind/unbind interfaces are added for this usage. This patch recognizes
this case and use new interfaces to
From: Chao Gao
Interrupt translation faults are non-recoverable. When fault is triggered, it
needs to populate fault info to Fault Recording Registers and inject vIOMMU
msi interrupt to notify guest IOMMU driver to deal with faults.
In this patch, the process how hardware
From: Chao Gao
Introduce a new guest interrupt type and provide a new interface to Qemu to
setup/update/unbind the new interrupt type.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
tools/libxc/include/xenctrl.h | 17
From: Chao Gao
Queued Invalidation Interface is an expanded invalidation interface with
extended capabilities. Hardware implementations report support for queued
invalidation interface through the Extended Capability Register. The queued
invalidation interface uses an
From: Chao Gao
In two situations, hypervisor injects a msi to a hvm guest. One is when qemu
sends a request to hypervisor through XEN_DMOP_inject_msi. The other is when a
physical interrupt arrives and it has been binded to a msi interrupt of guest.
The binding relationship
From: Chao Gao
No functional change.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/vmsi.c | 4 ++--
xen/drivers/passthrough/io.c | 34 +-
xen/include/xen/hvm/irq.h
From: Chao Gao
Software uses this field to enable/disable interrupt reampping. This patch
emulate IRES field of GCMD.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/vvtd.c | 26
From: Chao Gao
Software sets this field to set/update the interrupt remapping table pointer
used by hardware. The interrupt remapping table pointer is specified through
the Interrupt Remapping Table Address (IRTA_REG) register.
This patch emulates this operation and uses
From: Chao Gao
A new device, xen_viommu, is added to qemu. In xen side, we can inform device
model to create a guest with a vIOMMU device through "-device xen_viommu" when
a viommu has been configurated in guest configuration file. Some specific
parameters are passed through
From: Chao Gao
This patch is to add VVTD MMIO handler to deal with MMIO access.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/vvtd.c | 135
1 file changed,
From: Chao Gao
Software writes to QIE fields of GCMD to enable or disable queued
invalidations. This patch emulates QIE fields of GCMD.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/vvtd.c | 18
From: Chao Gao
When irq remapping enabled, IRE may not contain the vector of interrupt. So, a
new function, vioapic_gsi_vector() is added to translate gsi to vector.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
From: Chao Gao
When a remapping interrupt request arrives, remapping hardware computes the
interrupt_index per the algorithm described in VTD spec
"Interrupt Remapping Table", interprets the IRTE and generates a remapped
interrupte request.
In this patch, a new function
From: Chao Gao
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/vvtd.c | 22 +-
1 file changed, 21 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/hvm/vvtd.c
From: Chao Gao
When irq remapping enabled, IOAPIC Redirection Entry maybe is in remapping
format. If that, generate a irq_remapping_request and send it to domain.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
On Fri, Mar 17, 2017 at 11:29:38AM +, Wei Liu wrote:
> On Fri, Mar 17, 2017 at 05:26:07AM -0600, Jan Beulich wrote:
> > >>> On 17.03.17 at 12:14, wrote:
> > > --- a/xen/arch/x86/traps.c
> > > +++ b/xen/arch/x86/traps.c
> > > @@ -3537,7 +3537,7 @@ static void
From: Chao Gao
Only add create/destroy function for the emulated VTD in this patch and adapt
it to common VIOMMU layer. we will add more sub-feature of this emulated VTD.
Signed-off-by: Chao Gao
Signed-off-by: Lan Tianyu
---
This patch is to introduce create, destroy and query capabilities
command for vIOMMU. vIOMMU layer will deal with requests and call
arch vIOMMU ops.
Signed-off-by: Lan Tianyu
---
xen/arch/x86/hvm/dm.c | 29 +
From: Chao Gao
Add dmar table structure according Chapter 8 "BIOS Considerations" of
VTd spec Rev. 2.4.
VTd
spec:http://www.intel.com/content/dam/www/public/us/en/documents/product-specifications/vt-directed-io-spec.pdf
Signed-off-by: Chao Gao
From: Chao Gao
a field, viommu_info, is added to struct libxl_domain_build_info. Several
attributes can be specified by guest configuration file for the DMAR table
building and dummy vIOMMU creation.
In domain creation process, a new logic is added to build ACPI DMAR table
This patch is to introduct an abstract layer for arch vIOMMU implementation
to deal with requests from dom0. Arch vIOMMU code needs to provide callback
to perform create, destroy and query capabilities operation.
Signed-off-by: Lan Tianyu
---
xen/common/Makefile |
From: Chao Gao
The BIOS reports the remapping hardware units in a platform to system software
through the DMA Remapping Reporting (DMAR) ACPI table.
To build DMAR table during domain construction, two fields are added to struct
acpi_config. One is dmar_flag which indicates
From: Chao Gao
In previous patch, we introduce a common vIOMMU layer. In our design,
we create/destroy vIOMMU through DMOP interface instead of creating it
according to a config flag of domain. It makes it is possible
to create vIOMMU in device model or in tool stack.
The
On Fri, Mar 17, 2017 at 11:31:45AM +, Andrew Cooper wrote:
> On 17/03/17 11:29, Wei Liu wrote:
> > On Fri, Mar 17, 2017 at 05:26:07AM -0600, Jan Beulich wrote:
> > On 17.03.17 at 12:14, wrote:
> >>> --- a/xen/arch/x86/traps.c
> >>> +++ b/xen/arch/x86/traps.c
> >>> @@
This patch is to add get_irq_info callback for platform implementation
to convert irq remapping request to irq info (E,G vector, dest, dest_mode
and so on).
Signed-off-by: Lan Tianyu
---
xen/common/viommu.c | 11 +++
xen/include/asm-arm/viommu.h | 4
This patch is to add irq request callback for platform implementation
to deal with irq remapping request.
Signed-off-by: Lan Tianyu
---
xen/common/viommu.c | 11 +++
xen/include/asm-arm/viommu.h | 4
xen/include/asm-x86/viommu.h | 15 +++
This patchset is to introduce vIOMMU framework and add virtual VTD's
interrupt remapping support according "Xen virtual IOMMU high level
design doc V3"(https://lists.xenproject.org/archives/html/xen-devel/
2016-11/msg01391.html).
- vIOMMU framework
New framework provides viommu_ops and help
On 17/03/17 11:30, Paul Durrant wrote:
>> -Original Message-
>> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
>> Wei Liu
>> Sent: 17 March 2017 11:02
>> To: Xen-devel
>> Cc: Andrew Cooper ; Wei Liu
>>
On 17/03/17 11:29, Wei Liu wrote:
> On Fri, Mar 17, 2017 at 05:26:07AM -0600, Jan Beulich wrote:
> On 17.03.17 at 12:14, wrote:
>>> --- a/xen/arch/x86/traps.c
>>> +++ b/xen/arch/x86/traps.c
>>> @@ -3537,7 +3537,7 @@ static void nmi_hwdom_report(unsigned int reason_idx)
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Wei Liu
> Sent: 17 March 2017 11:02
> To: Xen-devel
> Cc: Andrew Cooper ; Wei Liu
> ; Jan Beulich
On Fri, Mar 17, 2017 at 05:26:07AM -0600, Jan Beulich wrote:
> >>> On 17.03.17 at 12:14, wrote:
> > --- a/xen/arch/x86/traps.c
> > +++ b/xen/arch/x86/traps.c
> > @@ -3537,7 +3537,7 @@ static void nmi_hwdom_report(unsigned int reason_idx)
> > {
> > struct domain *d =
>>> On 17.03.17 at 12:14, wrote:
> --- a/xen/arch/x86/traps.c
> +++ b/xen/arch/x86/traps.c
> @@ -3537,7 +3537,7 @@ static void nmi_hwdom_report(unsigned int reason_idx)
> {
> struct domain *d = hardware_domain;
>
> -if ( !d || !d->vcpu || !d->vcpu[0] ||
On Thu, Mar 16, 2017 at 5:39 PM, Julien Grall wrote:
> Hi Oleksandr,
Hi Julien
>
> On 03/15/2017 08:05 PM, Oleksandr Tyshchenko wrote:
>>
>> From: Oleksandr Tyshchenko
>>
>> Port Linux helper of_count_phandle_with_args for counting
>> number
On Thu, Mar 16, 2017 at 5:31 PM, Julien Grall wrote:
> On 03/15/2017 08:05 PM, Oleksandr Tyshchenko wrote:
>>
>> Hi, all.
>
>
> Hi Oleksandr,
Hi Julien
>
> Thank you for looking at the support of "non-shared" page table IOMMU
> support.
>
>>
>> The purpose of this patch
1 - 100 of 179 matches
Mail list logo