-Original Message-
From: Yu, Zhang [mailto:yu.c.zh...@linux.intel.com]
Sent: 09 December 2014 10:11
To: Paul Durrant; Keir (Xen.org); Tim (Xen.org); jbeul...@suse.com; Kevin
Tian; Xen-devel@lists.xen.org
Subject: One question about the hypercall to translate gfn to mfn.
Hi all
-Original Message-
From: Tim Deegan [mailto:t...@xen.org]
Sent: 09 December 2014 10:47
To: Yu, Zhang
Cc: Paul Durrant; Keir (Xen.org); jbeul...@suse.com; Kevin Tian; Xen-
de...@lists.xen.org
Subject: Re: One question about the hypercall to translate gfn to mfn.
At 18:10 +0800
-Original Message-
From: Ian Campbell
Sent: 09 December 2014 11:11
To: Paul Durrant
Cc: Tim (Xen.org); Yu, Zhang; Kevin Tian; Keir (Xen.org); jbeul...@suse.com;
Xen-devel@lists.xen.org
Subject: Re: [Xen-devel] One question about the hypercall to translate gfn to
mfn.
On Tue
-Original Message-
From: Ian Campbell
Sent: 09 December 2014 11:29
To: Paul Durrant
Cc: Tim (Xen.org); Yu, Zhang; Kevin Tian; Keir (Xen.org); jbeul...@suse.com;
Xen-devel@lists.xen.org
Subject: Re: [Xen-devel] One question about the hypercall to translate gfn to
mfn.
On Tue
-Original Message-
From: Wei Liu [mailto:wei.l...@citrix.com]
Sent: 03 February 2015 12:22
To: xen-devel@lists.xen.org
Cc: Wei Liu; Ian Campbell; Ian Jackson; Paul Durrant; Jan Beulich; Andrew
Cooper; Stefano Stabellini
Subject: Stubdom breakage in 4.5
Hi all
I recently found
-Original Message-
From: Don Slutz [mailto:dsl...@verizon.com]
Sent: 30 January 2015 19:19
To: Don Slutz; Jan Beulich; Paul Durrant
Cc: Andrew Cooper; Ian Campbell; Wei Liu; George Dunlap; Ian Jackson;
Stefano Stabellini; xen-devel@lists.xen.org; Keir (Xen.org)
Subject: Re: [PATCH 3
-Original Message-
From: Ian Campbell
Sent: 03 February 2015 13:48
To: Paul Durrant
Cc: Wei Liu; xen-devel@lists.xen.org; Ian Jackson; Jan Beulich; Andrew
Cooper; Stefano Stabellini
Subject: Re: Stubdom breakage in 4.5
On Tue, 2015-02-03 at 13:42 +, Paul Durrant wrote
-Original Message-
From: Paul Durrant
Sent: 03 February 2015 14:00
To: Ian Campbell
Cc: Wei Liu; xen-devel@lists.xen.org; Ian Jackson; Jan Beulich; Andrew
Cooper; Stefano Stabellini
Subject: RE: Stubdom breakage in 4.5
-Original Message-
From: Ian Campbell
Sent: 03
-Original Message-
From: Ian Campbell
Sent: 04 February 2015 12:30
To: Paul Durrant
Cc: Wei Liu; xen-devel@lists.xen.org; Ian Jackson; Jan Beulich; Andrew
Cooper; Stefano Stabellini
Subject: Re: Stubdom breakage in 4.5
On Tue, 2015-02-03 at 14:11 +, Paul Durrant wrote:
How
-Original Message-
From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
boun...@lists.xen.org] On Behalf Of Jan Beulich
Sent: 04 February 2015 12:46
To: Andrew Cooper
Cc: Xen-devel
Subject: Re: [Xen-devel] [PATCH] x86/hvm: Fix HVM guest regression
introduced by c58ba78c84
cosmetic.
No, they weren't were they.
Reviewed-by: Paul Durrant paul.durr...@citrix.com
---
xen/arch/x86/hvm/hvm.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index b03ee4e..4b7792d 100644
--- a/xen/arch/x86/hvm/hvm.c
-Original Message-
From: Stefano Stabellini [mailto:stefano.stabell...@eu.citrix.com]
Sent: 04 February 2015 15:12
To: Ian Jackson
Cc: xen-de...@lists.xensource.com; Stefano Stabellini; Paul Durrant; Ian
Campbell
Subject: Re: [qemu-upstream-unstable bisection] complete test-amd64
-Original Message-
From: Don Slutz [mailto:dsl...@verizon.com]
Sent: 04 February 2015 21:42
To: Paul Durrant; Ian Campbell
Cc: Wei Liu; Andrew Cooper; xen-devel@lists.xen.org; Stefano Stabellini; Jan
Beulich; Ian Jackson
Subject: Re: [Xen-devel] Stubdom breakage in 4.5
On 02/04
the pages are never removed from the guest physmap.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
Cc: Stefano Stabellini stefano.stabell...@citrix.com
---
xen/arch/x86/hvm/hvm.c | 11
to a guest before the
guest runs.
This patch works around the lack of interlock in the toolstack for
stub domains by keeping the domain paused until at least one ioreq
server is created and enabled, which in practice means the stub
domain is indeed up and running.
Signed-off-by: Paul Durrant
to a guest before the
guest runs.
This patch works around the lack of interlock in the toolstack for
stub domains by keeping the domain paused until at least one ioreq
server is created and enabled, which in practice means the stub
domain is indeed up and running.
Signed-off-by: Paul Durrant
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 06 February 2015 14:45
To: Paul Durrant
Cc: Andrew Cooper; Ian Campbell; Wei Liu; xen-devel@lists.xen.org; Keir
(Xen.org)
Subject: Re: [PATCH] x86/hvm: wait for at least one ioreq server to be
enabled
-Original Message-
From: Don Slutz [mailto:dsl...@verizon.com]
Sent: 02 February 2015 15:22
To: xen-devel@lists.xen.org; Jan Beulich; Paul Durrant
Cc: Andrew Cooper; George Dunlap; Ian Campbell; Ian Jackson; Keir
(Xen.org); Stefano Stabellini; Wei Liu; Don Slutz
Subject: [PATCH v2 3
-Original Message-
From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
boun...@lists.xen.org] On Behalf Of Oleksandr Dmytryshyn
Sent: 20 January 2015 09:03
To: xen-devel@lists.xen.org
Cc: Keir (Xen.org); Ian Jackson; Ian Campbell; Jan Beulich; Tim (Xen.org)
Subject: [Xen-devel]
-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: David Vrabel david.vra...@citrix.com
---
v2:
- Addressed comments from Andrew Cooper
- Check vector =16
- Put hypercall in x86-specific section
v3:
- Addressed comments from Jan Beulich
-Original Message-
From: Andrew Cooper
Sent: 16 January 2015 10:39
To: Paul Durrant; xen-devel@lists.xen.org
Cc: Keir (Xen.org); David Vrabel; Jan Beulich
Subject: Re: [Xen-devel] [PATCH v5] x86/hvm: Add per-vcpu evtchn upcalls
On 16/01/15 10:09, Paul Durrant wrote:
HVM guests
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 16 January 2015 11:59
To: Andrew Cooper; Paul Durrant; xen-devel@lists.xen.org
Cc: David Vrabel; Keir (Xen.org)
Subject: RE: [Xen-devel] [PATCH v5] x86/hvm: Add per-vcpu evtchn upcalls
On 16.01.15 at 12:07
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 16 January 2015 16:28
To: Paul Durrant
Cc: David Vrabel; xen-devel@lists.xen.org; Keir (Xen.org)
Subject: Re: [PATCH v5] x86/hvm: Add per-vcpu evtchn upcalls
On 16.01.15 at 11:09, paul.durr...@citrix.com wrote
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 11 February 2015 13:37
To: Paul Durrant
Cc: Andrew Cooper; Ian Campbell; Wei Liu; George Dunlap; Ian Jackson;
Stefano Stabellini; xen-devel@lists.xen.org; Don Slutz; Keir (Xen.org)
Subject: Re: [PATCH v3 3/3
I think that’s an answer to why hlt is a vmexit as opposed to when it is likely
to occur…
This simple answer, of course, is the OS idle process will most likely the
issuer of a hlt instruction and this is why you are seeing them so frequently.
Give your guest some compute-bound task and you’ll
-Original Message-
From: Wei Liu [mailto:wei.l...@citrix.com]
Sent: 27 January 2015 19:06
To: xen-devel@lists.xen.org
Cc: Wei Liu; Jan Beulich; Paul Durrant; Andrew Cooper
Subject: [PATCH] ioreq-server: handle IOREQ_TYPE_PCI_CONFIG in assist
function
QEMU stubdom will read PCI
-Original Message-
From: win-pv-devel-boun...@lists.xenproject.org [mailto:win-pv-devel-
boun...@lists.xenproject.org] On Behalf Of Christian Refvik
Sent: 27 January 2015 03:02
To: win-pv-de...@lists.xenproject.org
Cc: xen-de...@lists.xenproject.org
Subject: [win-pv-devel] Porting
-Original Message-
From: win-pv-devel-boun...@lists.xenproject.org [mailto:win-pv-devel-
boun...@lists.xenproject.org] On Behalf Of hanji unit
Sent: 31 December 2014 15:15
To: win-pv-de...@lists.xenproject.org; xen-devel@lists.xen.org
Subject: [win-pv-devel] XenBus_AddWatch
Hello,
the domain.
No functional change.
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Keir Fraser k...@xen.org
CC: Jan Beulich jbeul...@suse.com
Reviewed-by: Paul Durrant paul.durr...@citrix.com
---
xen/arch/x86/hvm/hvm.c | 12 ++--
xen/common/event_channel.c |4
-Original Message-
From: Don Slutz [mailto:dsl...@verizon.com]
Sent: 10 February 2015 22:52
To: xen-devel@lists.xen.org; Jan Beulich; Paul Durrant
Cc: Andrew Cooper; George Dunlap; Ian Campbell; Ian Jackson; Keir
(Xen.org); Stefano Stabellini; Wei Liu; Don Slutz
Subject: [PATCH v3 2
-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: David Vrabel david.vra...@citrix.com
---
v2:
- Addressed comments from Andrew Cooper
- Check vector =16
- Put hypercall in x86-specific section
v3:
- Addressed comments from Jan Beulich
-Original Message-
From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
boun...@lists.xen.org] On Behalf Of Ian Murray
Sent: 15 March 2015 22:59
To: xen-de...@lists.xensource.com
Subject: [Xen-devel] Compliling Xen 4.5.0 Fails with error: ‘bufioreq_pfn’ may
be used uninitialised
-Original Message-
From: Wei Liu [mailto:wei.l...@citrix.com]
Sent: 13 March 2015 10:35
To: xen-devel@lists.xen.org
Cc: Ian Campbell; Ian Jackson; Stefano Stabellini; Anthony Perard; Wei Liu;
Paul Durrant
Subject: [PATCH 5/5] Revert x86/hvm: wait for at least one ioreq server
-Original Message-
From: Stefano Stabellini [mailto:stefano.stabell...@eu.citrix.com]
Sent: 24 February 2015 16:36
To: Paul Durrant
Cc: Stefano Stabellini; Ian Jackson; xen-de...@lists.xensource.com; Ian
Campbell
Subject: RE: [qemu-upstream-unstable bisection] complete test-amd64
-Original Message-
From: Paul Durrant
Sent: 24 February 2015 17:11
To: 'Stefano Stabellini'
Cc: Stefano Stabellini; Ian Jackson; xen-de...@lists.xensource.com; Ian
Campbell
Subject: RE: [qemu-upstream-unstable bisection] complete test-amd64-i386-
freebsd10-i386
-Original
-Original Message-
From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
Sent: 24 February 2015 18:00
To: Paul Durrant
Cc: Stefano Stabellini; xen-de...@lists.xensource.com; Ian Campbell
Subject: RE: [qemu-upstream-unstable bisection] complete test-amd64-i386-
freebsd10-i386
Paul
-Original Message-
From: Don Slutz [mailto:dsl...@verizon.com]
Sent: 29 January 2015 19:41
To: Paul Durrant; Don Slutz; qemu-de...@nongnu.org; Stefano Stabellini
Cc: Peter Maydell; Olaf Hering; Alexey Kardashevskiy; Stefan Weil; Michael
Tokarev; Alexander Graf; Gerd Hoffmann; Stefan
Currently, unless a (non-default) ioreq server is explicitly disabled before
being destroyed, its gmfns will not be placed back into the p2m but still
released back into the ioreq_gmfn mask. This is somewhat counter-intuitive
and easily remedied by this small patch.
Signed-off-by: Paul Durrant
hvm_free_ioreq_gmfn has the sense of the ioreq_gmfn mask inverted; it
needs to set a bit to release the gmfn, not clear it.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
---
xen/arch
The following two patches fix a bug in the ioreq server gmfn release
code and also make the semantics of server destruction more intuitive.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 24 April 2015 09:01
To: Paul Durrant
Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
Subject: Re: [PATCH 1/2] x86/hvm: actually release ioreq server pages
On 23.04.15 at 17:46, paul.durr
Some parameters can only (validly) be set once. Some cannot be set
by a guest for its own domain. Consolidate these checks, along with
the XSM check, in a new hvm_allow_set_param() function for clarity.
Also, introduce hvm_allow_get_param() for similar reasons.
Signed-off-by: Paul Durrant
The subject line should obviously be prefixed [PATCH 0/3], but the content is
at least correct.
Apologies for that,
Paul
-Original Message-
From: Paul Durrant [mailto:paul.durr...@citrix.com]
Sent: 24 April 2015 17:21
To: xen-de...@lists.xenproject.org
Cc: Paul Durrant
Subject
The level of switch nesting in those ops is getting unreadable. Giving
them their own functions does introduce some code duplication in the
the pre-op checks but the overall result is easier to follow.
This patch is code movement. There is no functional change.
Signed-off-by: Paul Durrant
A guest has no need to touch these parameters and reading
HVM_PARAM_IOREQ_PFN, HVM_PARAM_BUFIOREQ_PFN, or HVM_PARAM_BUFIOREQ_EVTCHN
may cause Xen to create a default ioreq server where one did not already
exist.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc
Apologies for breaking the threading. The mail server ate the thread and I
couldn't manage to get it back...
[snip]
OK, here it is as a proper patch. I still haven't tested it -- indeed
I'm not sure how to test multiple ioreq clients. Any suggestions?
Paul?
Thanks, Jan
Testing multiple is
-Original Message-
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: 25 April 2015 01:19
To: Paul Durrant; xen-de...@lists.xenproject.org
Cc: Keir (Xen.org); Jan Beulich
Subject: Re: [PATCH 2/3] x86/hvm: introduce functions for
HVMOP_get/set_param allowance checks
-Original Message-
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: 25 April 2015 01:12
To: Paul Durrant; xen-de...@lists.xenproject.org
Cc: Keir (Xen.org); Jan Beulich
Subject: Re: [PATCH 1/3] x86/hvm: give HVMOP_set_param and
HVMOP_get_param their own functions
The following 3 patches re-structure the code implementing HVMOP_set_param
and HVMOP_get_param.
Patch #1 gives each operation its own function
Patch #2 splits out checks for getting/setting non-reflexive params and
setting params with change-once semantics, as well as the XSM check into
separate
accessible parameter checks as
black-lists and does not make any changes to which parameters
can be accessed. A subsequent patch will tighten up these
checks by changing from black-lists to white-lists.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k
The following 3 patches re-structure the code implementing HVMOP_set_param
and HVMOP_get_param.
Patch #1 gives each operation its own function
Patch #2 splits out checks for getting/setting non-reflexive params and
setting params with change-once semantics, as well as the XSM check into
separate
-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
---
xen/arch/x86/hvm/hvm.c | 561 ++--
1 file changed, 299 insertions(+), 262 deletions(-)
diff
Sorry, this was an artefact of the previous set... Please ignore.
Paul
-Original Message-
From: Paul Durrant [mailto:paul.durr...@citrix.com]
Sent: 01 May 2015 15:06
To: xen-de...@lists.xenproject.org
Cc: Paul Durrant
Subject: [PATCH 0/2] x86/hvm: HVMOP_get/set_param improvements
-Original Message-
From: Paul Durrant
Sent: 01 May 2015 14:39
To: 'Jan Beulich'
Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
Subject: RE: [PATCH 2/3] x86/hvm: introduce functions for
HVMOP_get/set_param allowance checks
-Original Message-
From: Jan
There are actually very few HVM parameters that a guest needs to read
and even fewer that a guest needs to write. Use white-lists to specify
those parameters and also ensre that, by default, newly introduced
parameters are not accessible.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 29 April 2015 13:29
To: Paul Durrant
Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
Subject: Re: [PATCH 2/3] x86/hvm: introduce functions for
HVMOP_get/set_param allowance checks
Paul
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 01 May 2015 20:19
To: Andrew Cooper; Paul Durrant
Cc: xen-de...@lists.xenproject.org; Keir (Xen.org)
Subject: Re: [PATCH v2 1/3] x86/hvm: give HVMOP_set_param and
HVMOP_get_param their own functions
Paul
-Original Message-
From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
Sent: 05 May 2015 11:54
To: Paul Durrant; xen-de...@lists.xenproject.org
Cc: Keir (Xen.org); Jan Beulich
Subject: Re: [PATCH v3 3/3] x86/hvm: Use white-lists for HVM param guest
accessibility checks
On 05
The following 3 patches re-structure the code implementing HVMOP_set_param
and HVMOP_get_param.
Patch #1 gives each operation its own function
Patch #2 splits out checks for getting/setting non-reflexive params and
setting params with change-once semantics, as well as the XSM check into
separate
-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
---
xen/arch/x86/hvm/hvm.c | 506 ++--
1 file changed, 273 insertions(+), 233 deletions(-)
diff
.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
---
xen/arch/x86/hvm/hvm.c | 136 ++--
1 file changed, 84 insertions(+), 52 deletions
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 06 May 2015 13:27
To: Paul Durrant
Cc: xen-de...@lists.xenproject.org; Keir (Xen.org)
Subject: Re: [PATCH v4 1/3] x86/hvm: give HVMOP_set_param and
HVMOP_get_param their own functions
On 05.05.15 at 17:47
There are actually very few HVM parameters that a guest needs to read
and even fewer that a guest needs to write. Use white-lists to specify
those parameters and also ensre that, by default, newly introduced
parameters are not accessible.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc
-Original Message-
From: win-pv-devel-boun...@lists.xenproject.org [mailto:win-pv-devel-
boun...@lists.xenproject.org] On Behalf Of Fabio Fantoni
Sent: 08 May 2015 15:54
To: xen-devel; win-pv-de...@lists.xenproject.org
Cc: Anthony Perard; Wei Liu; Ian Campbell; Stefano Stabellini
and HVM_PARAM_CONSOLE_EVTCHN to
the guest-settable white-list since either of them can be invalidated
by an event channel ABI reset and thus the guest may indeed need to
write new values to them to make them valid again.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul
-Original Message-
From: Fabio Fantoni [mailto:fabio.fant...@m2r.biz]
Sent: 08 May 2015 16:11
To: Paul Durrant; xen-devel; win-pv-de...@lists.xenproject.org
Cc: Anthony Perard; Wei Liu; Ian Campbell; Stefano Stabellini
Subject: Re: [win-pv-devel] Question about windows domU long boot
-Original Message-
From: Fabio Fantoni [mailto:fabio.fant...@m2r.biz]
Sent: 11 May 2015 11:27
To: Paul Durrant; Ian Campbell; Wei Liu
Cc: xen-devel; win-pv-de...@lists.xenproject.org; Anthony Perard; Stefano
Stabellini
Subject: Re: [win-pv-devel] Question about windows domU long
-Original Message-
From: Ian Campbell [mailto:ian.campb...@citrix.com]
Sent: 11 May 2015 09:42
To: Wei Liu
Cc: Paul Durrant; Fabio Fantoni; xen-devel; win-pv-
de...@lists.xenproject.org; Anthony Perard; Stefano Stabellini
Subject: Re: [win-pv-devel] Question about windows domU long
the increased use of QEMU and Xen in that period it would seem
like a good idea to default both of these on now. This patch does that.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
---
src/Kconfig |4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/Kconfig b/src/Kconfig
-Original Message-
From: Kevin O'Connor [mailto:ke...@koconnor.net]
Sent: 11 May 2015 14:41
To: Paul Durrant
Cc: seab...@seabios.org; xen-de...@lists.xenproject.org
Subject: Re: [SeaBIOS] [PATCH] Make CONFIG_ATA_DMA and
CONFIG_ATA_PIO32 default on
On Mon, May 11, 2015 at 01:47
The following 3 patches re-structure the code implementing HVMOP_set_param
and HVMOP_get_param.
Patch #1 gives each operation its own function
Patch #2 splits out checks for getting/setting non-reflexive params and
setting params with change-once semantics, as well as the XSM check into
separate
There are actually very few HVM parameters that a guest needs to read
and even fewer that a guest needs to write. Use white-lists to specify
those parameters and also ensre that, by default, newly introduced
parameters are not accessible.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc
-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
---
xen/arch/x86/hvm/hvm.c | 556 +---
1 file changed, 294 insertions(+), 262 deletions(-)
diff
.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
---
xen/arch/x86/hvm/hvm.c | 153
1 file changed, 90 insertions(+), 63 deletions
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 01 May 2015 20:28
To: Paul Durrant
Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org)
Subject: Re: [PATCH v2 2/3] x86/hvm: introduce functions for
HVMOP_get/set_param allowance checks
Paul
-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Reviewed-by: Andrew Cooper andrew.coop...@citrix.com
---
xen/arch/x86/hvm/hvm.c | 556 +---
1 file changed, 294 insertions(+), 262 deletions(-)
diff
There are actually very few HVM parameters that a guest needs to read
and even fewer that a guest needs to write. Use white-lists to specify
those parameters and also ensre that, by default, newly introduced
parameters are not accessible.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc
The following 3 patches re-structure the code implementing HVMOP_set_param
and HVMOP_get_param.
Patch #1 gives each operation its own function
Patch #2 splits out checks for getting/setting non-reflexive params and
setting params with change-once semantics, as well as the XSM check into
separate
.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
---
xen/arch/x86/hvm/hvm.c | 153
1 file changed, 90 insertions(+), 63 deletions(-)
diff
-Original Message-
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
Sent: 15 May 2015 16:23
To: Bob Liu; m...@amazon.com; Paul Durrant; Keir (Xen.org)
Cc: xen-devel@lists.xen.org; David Vrabel; just...@spectralogic.com; Roger
Pau Monne
Subject: Re: [PATCH] xen: blkif.h
-Original Message-
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
Sent: 15 May 2015 16:55
To: Jan Beulich
Cc: Bob Liu; m...@amazon.com; David Vrabel; Paul Durrant; Roger Pau
Monne; xen-devel@lists.xen.org; just...@spectralogic.com; Keir (Xen.org)
Subject: Re: [Xen-devel
De-htmling...
-
From: Fabio Fantoni [mailto:fabio.fant...@m2r.biz]
Sent: 12 May 2015 15:35
To: xen-devel
Cc: Yu, Zhang; Paul Durrant
Subject: Question about 16-byte MMIO emulation fix
Hi I saw:
This is Zhang Yu from Intel graphic virtualization team. Previously in Xen
hackathon, Paul and I
-Original Message-
From: Wei Liu [mailto:wei.l...@citrix.com]
Sent: 09 April 2015 19:49
To: xen-devel@lists.xen.org
Cc: Ian Campbell; Ian Jackson; Wei Liu; Paul Durrant; Jan Beulich
Subject: [PATCH v4 3/3] Revert x86/hvm: wait for at least one ioreq server
to be enabled
-Original Message-
From: Michael S. Tsirkin [mailto:m...@redhat.com]
Sent: 09 June 2015 10:13
To: Don Slutz
Cc: qemu-de...@nongnu.org; xen-devel@lists.xen.org; Paul Durrant;
Stefano Stabellini
Subject: Re: [PATCH v2 0/4] Fix device listener interface for PCI to PCI
bridges
-Original Message-
From: Don Slutz [mailto:dsl...@verizon.com]
Sent: 08 June 2015 22:19
To: qemu-de...@nongnu.org; xen-devel@lists.xen.org
Cc: Michael S. Tsirkin; Paul Durrant; Stefano Stabellini; Don Slutz; Don Slutz
Subject: [PATCH v2 2/4] Extend device listener interface for PCI
-Original Message-
From: Bob Liu [mailto:bob@oracle.com]
Sent: 09 June 2015 09:50
To: Bob Liu
Cc: xen-devel@lists.xen.org; David Vrabel; just...@spectralogic.com;
konrad.w...@oracle.com; Roger Pau Monne; Paul Durrant; Julien Grall; linux-
ker...@vger.kernel.org
Subject: Re
-Original Message-
From: Don Slutz [mailto:dsl...@verizon.com]
Sent: 08 June 2015 22:19
To: qemu-de...@nongnu.org; xen-devel@lists.xen.org
Cc: Michael S. Tsirkin; Paul Durrant; Stefano Stabellini; Don Slutz; Don Slutz
Subject: [PATCH v2 4/4] xen: Fix map/unmap of pcidev to ioreq
-Original Message-
From: Michael S. Tsirkin [mailto:m...@redhat.com]
Sent: 09 June 2015 11:52
To: Paul Durrant
Cc: Don Slutz; qemu-de...@nongnu.org; xen-devel@lists.xen.org; Stefano
Stabellini
Subject: Re: [PATCH v2 0/4] Fix device listener interface for PCI to PCI
bridges
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: 05 June 2015 10:36
To: Don Slutz; Don Slutz
Cc: Aravind Gopalakrishnan; Suravee Suthikulpanit; Andrew Cooper; Ian
Campbell; Paul Durrant; George Dunlap; Ian Jackson; Stefano Stabellini; Eddie
Dong; Jun Nakajima
radix tree. Yet this
approach would consume too much memory space. Now trying to use the
interval rbtree. Will send the patch out ASAP.
fixing 16-byte MMIO emulation: Paul Durrant has been working on this.
I have what I believe is a complete patch series. Now trying to write some
targeted
).
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
---
xen/arch/x86/hvm/emulate.c | 81 +++-
xen/arch/x86/hvm/intercept.c | 56
at a
different ioreq server.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc; Andrew Cooper andrew.coop...@citrix.com
---
xen/arch/x86/hvm/emulate.c | 36 +---
xen/arch/x86/hvm/hvm.c | 74
(). Returning X86EMUL_UNHANDLEABLE allows the
higher layers of emulation to decide what to do instead.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
---
xen/arch/x86/hvm/emulate.c| 10
This patch re-works the dpci portio intercepts so that they can be unified
with standard portio handling thereby removing a substantial amount of
code duplication.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper
This patch series re-works much of the code involved in emulation of port
and memory mapped I/O for HVM guests.
The code has become very convoluted and, at least by inspection, certain
emulations will apparently malfunction.
The series is broken down into 17 patches (which are also available in
all mmio and portio handled within Xen now goes through
process_io_intercept().
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
---
xen/arch/x86/hvm/emulate.c |7 ++
xen/arch/x86/hvm
and cosmetic changes in a single patch.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
---
tools/tests/vhpet/emul.h |8 +++---
tools/tests/vhpet/main.c
The state of in-flight I/O and how its completion will be handled are
logically separate and conflating the two makes the code unnecessarily
confusing.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop
The implementation of mmio and portio intercepts is unnecessarily different.
This leads to much code duplication. This patch unifies much of the
intercept handling, leaving only distinct handlers for stdvga mmio and dpci
portio. Subsequent patches will unify those handlers.
Signed-off-by: Paul
By removing the HVMIO_dispatched state and making all pending emulations
(i.e. all those not handled by the hypervisor) use HVMIO_awating_completion,
various code-paths can be simplified.
Signed-off-by: Paul Durrant paul.durr...@citrix.com
Cc: Keir Fraser k...@xen.org
Cc: Jan Beulich jbeul
1 - 100 of 1983 matches
Mail list logo