aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Update Xen version to 4.0.2-rc34.0.2-rc3Keir Fraser2011-04-132-2/+2
|
* x86, amd, MTRR: correct DramModEn bit of SYS_CFG MSRWei Huang2011-04-071-0/+28
| | | | | | | | | | Some buggy BIOS might set SYS_CFG DramModEn bit to 1, which can cause unexpected behavior on AMD platforms. This patch clears DramModEn bit if it is 1. Signed-off-by: Wei Huang <wei.huang2@amd.com> xen-unstable changeset: 23153:8fb61c9ebe49 xen-unstable date: Wed Apr 06 09:01:31 2011 +0100
* X86: Fix mce offline page bugLiu, Jinsong2011-04-071-10/+1
| | | | | | | | | | | | | c/s 19913 break mce offline page logic: For page_state_is(pg, free), it's impossible to trigger the case; For page_state_is(pg, offlined), it in fact didn't offline related page; This patch fix the bug, and remove an ambiguous comment. Signed-off-by: Liu, Jinsong <jinsong.liu@intel.com> xen-unstable changeset: 23177:d8bb2de119de xen-unstable date: Thu Apr 07 12:12:01 2011 +0100
* x86/hvm: load CPU structures from xen versions <=3.4George Dunlap2011-04-071-1/+126
| | | | | | | | | | | | | Xen 4.0 added "msr_tsc_aux" in the middle of the hvm_hw_cpu structure, making it incompatible with pre-3.4 savefiles. This patch uses the recently introduced backwards-compatibility infrastructure to convert the old to the new. Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 23172:dc8b05d22a59 xen-unstable date: Wed Apr 06 11:40:54 2011 +0100
* hvm: infrastructure for backwards-compatible loadingGeorge Dunlap2011-04-072-8/+36
| | | | | | | | | | | | | | | | | | | | | | | | The hvm_save code is used to save and restore hypervisor-related hvm state, either for classic save/restore, or for migration (including remus). This is meant to be backwards-compatible across some hypervisor versions; but if it does change, there is no way to handle the old format as well as the new. This patch introduces the infrastructure to allow a single older version ("compat") of any given "save type" to be defined, along with a function to turn the "old" version into the "new" version. If the size check fails for the "normal" version, it will check the "compat" version, and if it matches, will read the old entry and call the conversion function. This patch involves some preprocessor hackery, but I'm only extending the hackery that's already there. Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 23171:6a5830de7b54 xen-unstable date: Wed Apr 06 11:40:51 2011 +0100
* hvm save: Introduce hvm_load_entry_zeroextend().Keir Fraser2011-04-073-11/+22
| | | | | | | | | | | | In certain cases this will allow us to load old HVM save images where an HVM saved chunk has subsequently been extended with new fields. Rather than fail to load the chunk, we can pad the extended structure with zeroes, if the caller knows how to handle that. Signed-off-by: Keir Fraser <keir@xen.org> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 22524:1f08b2932a52 xen-unstable date: Wed Dec 15 10:21:05 2010 +0000
* hvm save: Move some inline functions into common/hvm/save.cKeir Fraser2011-04-072-62/+81
| | | | | | Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 22523:6dda9f988ef3 xen-unstable date: Wed Dec 15 10:15:45 2010 +0000
* xen: fix reloc.S generation for non-gnu toolchainChristoph Egger2011-04-021-2/+2
| | | | | | | | The output of AT&T UNIX and GNU od(1) are different. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> xen-unstable changeset: 23130:0e88c781a8a8 xen-unstable date: Sat Apr 02 15:53:35 2011 +0100
* x86: __pirq_guest_eoi() must check it is called for a fullyKeir Fraser2011-04-021-0/+6
| | | | | | | | guest-bound irq before accessing desc->action. Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23103:48dac730a93b xen-unstable date: Sat Mar 26 09:42:01 2011 +0000
* tools/blktap, blktap2: include <sys/mount.h> instead of <linux/fs.h>Ian Campbell2011-03-262-3/+3
| | | | | | | | | | | | | | The former is a userspace sanitised header which contains the definitions we need. In some distros linux/fs.h defines WRITE which conflicts with blktaps own use of that name. Also there is no reason to use <linux/errno.h> over the more normal <errno.h>. Signed-off-by: Ian Campbell <ian.campbell@citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> xen-unstable changeset: 22765:0dbad563a659 xen-unstable date: Mon Jan 17 17:14:20 2011 +0000
* init.d: Fix xencommons init script chkconfig configurationKeir Fraser2011-03-251-1/+1
| | | | | | | | | | | | | | | | Fix the xencommons init script chkconfig configuration since the priority was missing here and chkconfig was complaining about invalid chkconfig script so I added both start and stop priorities to the chkconfig line and it was working fine, the script was successfully added to chkconfig when using `chkconfig --add xencommons` and management using the chkconfig utility was now possible. Tested on RHEL-5 Server with Xen-4.1-unstable installed, running on PVops kernel 2.6.32.15 and it was working fine. Signed-off-by: Michal Novotny <minovotn@redhat.com> xen-unstable changeset: 21657:e2f5e4f3481c xen-unstable date: Tue Jun 22 16:22:30 2010 +0100
* x86: run-time callers of map_pages_to_xen() must check for errorsJan Beulich2011-03-154-50/+95
| | | | | | | | | | | | | | | | | | | | | | | | | | | Again, (out-of-memory) errors must not cause hypervisor crashes, and hence ought to be propagated. This also adjusts the cache attribute changing loop in get_page_from_l1e() to not go through an unnecessary iteration. While this could be considered mere cleanup, it is actually a requirement for the subsequent now necessary error recovery path. Also make a few functions static, easing the check for potential callers needing adjustment. Signed-off-by: Jan Beulich <jbeulich@novell.com> xen-unstable changeset: 22997:5f28dcea1355 xen-unstable date: Wed Mar 09 16:15:36 2011 +0000 x86: don't BUG() post-boot in alloc_xen_pagetable() Instead, propagate the condition to the caller, all of which also get adjusted to check for that situation. Signed-off-by: Jan Beulich <jbeulich@novell.com> xen-unstable changeset: 22996:1eeccafe9042 xen-unstable date: Wed Mar 09 16:14:59 2011 +0000
* _csched_cpu_pick(): don't return CPUs outside vCPU's affinity maskJan Beulich2011-03-141-0/+1
| | | | | | | | | This fixes a fairly blatant bug I introduced in c/s 20377:cff23354d026 - I wonder how this went unnoticed for so long. Signed-off-by: Jan Beulich <jbeulich@novell.com> xen-unstable changeset: 23039:c40da47621d8 xen-unstable date: Mon Mar 14 17:19:22 2011 +0000
* x86_64: fix error checking in arch_set_info_guest()Tim Deegan2011-03-141-0/+5
| | | | | | | | | | Cannot specify user mode execution without specifying user-mode pagetables. Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com> Acked-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23034:c79aae866ad8 xen-unstable date: Mon Mar 14 16:59:49 2011 +0000
* libxc: fix incorrect scanning of pfn array in pagebuf during migrationShriram Rajagopalan2011-03-141-4/+4
| | | | | | | | | | | | | | | | | | | | | | xc_domain_restore.c:apply_batch function makes two passes over the pfn_types array in pagebuf to allocate the needed MFNs. The curbatch parameter to this function specifies the array offset in pfn_types, from where the current scan should begin. But this variable is not taken into account (index always starts at 0) during the two passes. While this [bug] does not manifest itsef during save/restore or live migration, under Remus, xc_domain_restore fails due to corrupt guest page tables. (This appears to have been broken by 21588:6c3d8aec202d which reverted two changesets from before Remus support was added and hence reintroduced some none-Remus compatible bits.) Signed-off-by: Shriram Rajagopalan <rshriram@cs.ubc.ca> Acked-by: Ian Campbell <ian.campbell@citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> xen-unstable changeset: 22967:5bc39222773d xen-unstable date: Thu Mar 03 16:55:27 2011 +0000
* x86/HPET: fix initialization orderJan Beulich2011-03-121-2/+4
| | | | | | | | | | | | | | | At least the legacy path can enter its interrupt handler callout while initialization is still in progress - that handler checks whether ->event_handler is non-NULL, and hence all other initialization must happen before setting this field. Do the same to the MSI initialization just in case (and to keep the code in sync). Signed-off-by: Jan Beulich <jbeulich@novell.com> Acked-by: Wei Gang <gang.wei@intel.com> xen-unstable changeset: 23030:87aa1277eae0 xen-unstable date: Sat Mar 12 13:19:02 2011 +0000
* tools: provide startup script for libxlIan Jackson2011-03-102-0/+83
| | | | | | | | | | | | | | | | | | | | | | | In Xen 4.0 there is no /etc/init.d/xencommons. This means that in most situations you don't get xenstored, and xl doesn't work, unless you do something shonky like starting and then immediately stopping xend. To test xl, my automatic testing system therefore provides its own init script to start xenstored and xenconsoled. This script was created by borrowing from /etc/init.d/xend and other init scripts in various versions of xen.hg. Here it is[1], as a new "xencommons" script. The user will still have to add appropriate rc links, and only a script for Linux is provided. We do not want to backport the refactoring of /etc/init.d/xend, so xend users should not enable this script. [1] Copied from osstest.git#78c59993ab536b8c39c5a00a xenlightdaemons. Signed-off-by: Ian Jackson <ian.jackson@eu.citrix.com> Acked-by: Ian Campbell <Ian.Campbell@eu.citrix.com>
* x86_emulate: FPU 0xda instructions have a 32-bit memory operand, not 64-bit.Keir Fraser2011-03-081-9/+9
| | | | | | Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 22993:22eb31eb688a xen-unstable date: Tue Mar 08 16:14:55 2011 +0000
* x86_emulate: Fix emulation of FIMUL m32i.Keir Fraser2011-03-081-1/+1
| | | | | | | | Need to emit assembler instruction fimull not fimul/fimuls. Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 22992:e93392bd6b66 xen-unstable date: Tue Mar 08 16:10:13 2011 +0000
* x86, libxc: Fix xc_translate_foreign_address() for PV guests ofKeir Fraser2011-03-082-3/+5
| | | | | | | | | different bitness than dom0 (32-bit vs 64-bit). Original patch by: Paolo Bonzini <pbonzini@redhat.com> Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 22966:de49500f344a xen-unstable date: Thu Mar 03 17:46:44 2011 +0000
* amd-k8-mce: remove a stray break statementKeir Fraser2011-02-241-1/+0
| | | | | | | | | | | | | This was a leftover of converting from a switch to an if/else somewhere between 3.4 and 4.0. It also looks suspicious that MCEQUIRK_K7_BANK0 is not actually used anywhere. Perhaps amd_k7_mcheck_init() and amd_k8_mcheck_init() were intended to get (partially) folded? Signed-off-by: Jan Beulich <jbeulich@novell.com> xen-unstable changeset: 22947:598d1fc295b6 xen-unstable date: Thu Feb 24 09:33:19 2011 +0000
* [IA64] fix missing header: asm/fpswa.hKUWAMURA Shin'ya2011-02-181-0/+1
| | | | | | | | | | This patch fixes the following error in recent kernel: ia64/asm/dom_fw_common.h:47:23: error: asm/fpswa.h: No such file or directory Signed-off-by: KUWAMURA Shin'ya <kuwa@jp.fujitsu.com> xen-unstable changeset: 22941:d12a28ef91b9 xen-unstable date: Fri Feb 18 10:21:19 2011 +0000
* Update Xen version to 4.0.2-rc3-preKeir Fraser2011-02-101-1/+1
|
* Added signature for changeset 52a073532ff2Keir Fraser2011-02-101-0/+1
|
* Added tag 4.0.2-rc2 for changeset 52a073532ff2Keir Fraser2011-02-101-0/+1
|
* Update Xen version to 4.0.2-rc24.0.2-rc2Keir Fraser2011-02-102-2/+2
|
* amd iommu: Fix a xen crash after pci-attachKeir Fraser2011-02-101-0/+6
| | | | | | | | | | pci-detach triggers IO page table deallocation if the last passthru device has been removed from pdev list, and this will result a BUG on amd systems for next pci-attach. This patch fixes this issue. Signed-off-by: Wei Wang <wei.wang2@amd.com> xen-unstable changeset: 22872:cba9a84d32fb xen-unstable date: Sun Feb 06 16:54:01 2011 +0000
* x86/hvm: don't let domains call HVMOP_set_mem_type on themselves.Tim Deegan2011-02-091-0/+4
| | | | | | Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 22879:098c8a6483c9 xen-unstable date: Mon Feb 07 09:39:59 2011 +0000
* Revert 21334:993458f6c5a0 (xen-unstable 22071:c5aed2e049bc).Keir Fraser2011-02-071-6/+0
| | | | Signed-off-by: Keir Fraser <keir@xen.org>
* trace: Change trace_var argument to void*, to match __trace_varKeir Fraser2011-02-061-1/+1
| | | | | | Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com> xen-unstable changeset: 22877:575d2f40acc4 xen-unstable date: Sun Feb 06 17:22:44 2011 +0000
* hvm amd: Fix 32bit guest VM save/restore issues associated with SYSENTER MSRsKeir Fraser2011-02-061-15/+26
| | | | | | | | | | | | This patch turn-on SYSENTER MSRs interception for 32bit guest VMs on AMD CPUs. With it, hvm_svm.guest_sysenter_xx fields always contain the canonical version of SYSENTER MSRs and are used in guest save/restore. The data fields in VMCB save area are updated as necessary. Reported-by: James Harper <james.harper@bendigoit.com.au> Signed-off-by: Wei Huang <wei.huang2@amd.com> xen-unstable changeset: 22873:186162762071 xen-unstable date: Sun Feb 06 17:03:09 2011 +0000
* x86: Fix pirq teardown on domain destruction.Wei Gang2011-01-261-3/+0
| | | | | | | | | | | The privilege check in unmap_domain_pirq() fails since the teardown completes in RCU (idle domain) context. We can remove the check since it is covered in physdev_op() already, which is the only potentially unprivileged caller. Signed-off-by: Wei Gang <gang.wei@intel.com> xen-unstable changeset: 22816:e7f44fb4ecc3 xen-unstable date: Wed Jan 26 08:54:12 2011 +0000
* x86: blacklist new AMD CPUID bits for PV domainsKeir Fraser2011-01-264-0/+20
| | | | | | | | | | | | | | there are some new CPUID bits (and leaves) which Dom0 and PV domains should not see to avoid trouble, since we don't emulate the features. The most prominent one is a topology leaf, which contains information specific to the physical CPU, not the virtual one. To avoid confusion (and possibly crashes) due to a confused Dom0 scheduler simply disable these bits. Signed-off-by: Andre Przywara <andre.przywara@amd.com> Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 22815:4785c70c2b6d xen-unstable date: Wed Jan 26 08:45:40 2011 +0000
* x86: Do not pollute namespace with asm defns of PERFC_*.Keir Fraser2011-01-267-11/+11
| | | | | | | | This fixes the build with perfc=y. Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 22814:b9017fdaad4d xen-unstable date: Wed Jan 26 08:35:24 2011 +0000
* x86/tsc: remove misleading printk on HVM restore path.Keir Fraser2011-01-251-5/+0
| | | | | | | | This warning no longer corresponds to what the code actually does. Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 22800:c50ae9d5dda4 xen-unstable date: Tue Jan 25 14:05:25 2011 +0000
* x86_emulate: set the operand size for SMSW/reg writeback.Keir Fraser2011-01-211-2/+1
| | | | | | | | | Otherwise it defaults to 0 bytes. Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com> Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 22782:fe8a177ae9cb xen-unstable date: Wed Jan 19 15:29:04 2011 +0000
* xen: fix XEN_DOMCTL_memory_mapping to not return with domain RCU lock heldKeir Fraser2011-01-181-4/+4
| | | | | | | | Broken in 20358:ecc649ec3675 Signed-off-by: Ian Campbell <ian.campbell@citrix.com> xen-unstable changeset: 22775:e4688c57c230 xen-unstable date: Tue Jan 18 09:04:04 2011 +0000
* xen: stringify assertion condition for printing sooner.Keir Fraser2011-01-182-3/+3
| | | | | | | | | | | | | | | So that: (XEN) Assertion '!(((*({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"(&per_cpu____preempt_count)); (typeof(&per_cpu____preempt_count)) (__ptr + (get_cpu_info()->per_cpu_offset)); }))) || ((irq_stat[(((get_cpu_info()->processor_id)1... becomes: (XEN) Assertion '"!in_atomic()"' failed at softirq.c:61 Signed-off-by: Ian Campbell <ian.campbell@citrix.com> xen-unstable changeset: 22774:96441daf4a5b xen-unstable date: Tue Jan 18 09:01:57 2011 +0000
* pv-drivers: use PCI interfaces to request IO and MEM resources on platform ↵Keir Fraser2011-01-141-13/+9
| | | | | | | | | | | | | | | | device This is the correct interface to use and something has broken the use of the previous incorrect interface (which fails because the request conflicts with the resources assigned for the PCI device itself instead of nesting like the PCI interfaces do). pci_request_region() has been available since at least Linux 2.6.5. Signed-off-by: Ian Campbell <ian.campbell@citrix.com> Signed-off-by: Jan Beulich <jbeulich@novell.com> xen-unstable changeset: 22747:7bc5e072d986 xen-unstable date: Fri Jan 14 08:02:26 2011 +0000
* kexec: fix ia64 build for 21300:8bdf09baff30KUWAMURA Shin'ya2011-01-141-0/+5
| | | | | | | | | | On ia64, 21300:8bdf09baff30 introduces the following error: xen/common/kexec.c:490: undefined reference to `continue_hypercall_on_cpu' The function continue_hypercall_on_cpu() is defined only on x86. Signed-off-by: KUWAMURA Shin'ya <kuwa@jp.fujitsu.com>
* VT-d: fix ia64 buildKeir Fraser2011-01-141-0/+8
| | | | | | | | The identifier `dest_LowestPrio' is defined on only x86. Signed-off-by: KUWAMURA Shin'ya <kuwa@jp.fujitsu.com> xen-unstable changeset: 22092:e0ec7b10f8ce xen-unstable date: Thu Sep 02 13:36:23 2010 +0100
* stubdom: Fix stubdom-dm using "grep" improperlyJohn Weekes2011-01-141-1/+1
| | | | | | | | | | | | | | | | | | | | stubdom-dm uses "grep" on "xm list" output to determine whether it is already running. The existing behavior is to use "grep $domname-dm" but this will result in a false-positive in the case of another domU running whose name ends with the full new name; for instance, if "abctest-dm" is running, a new "test-dm" will spin forever, waiting for it the end. Any easy fix is to have it use "grep -w" instead of "grep", searching for the whole word only. It also might be worth considering a switch to "xl list" from "xm list", here and in other places. Signed-off-by: John Weekes <lists.xen@nuclearfallout.net> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> xen-unstable changeset: 22714:6852e3e7ef58 xen-unstable date: Tue Jan 11 16:42:41 2011 +0000
* x86: don't crash when a CPU cannot be brought online during bootKeir Fraser2011-01-111-4/+7
| | | | | | | x86_cpu_to_apicid[] gets set to BAD_APICID when bringup of a secondary CPU fails, yet srat_detect_node() wants to use this as array index. Signed-off-by: Jan Beulich <jbeulich@novell.com>
* Update Xen version to 4.0.2-rc2-preKeir Fraser2011-01-111-1/+1
|
* Added signature for changeset 0bd829255a3fKeir Fraser2011-01-101-0/+1
|
* Added tag 4.0.2-rc1 for changeset 0bd829255a3fKeir Fraser2011-01-101-0/+1
|
* Update Xen version to 4.0.2-rc14.0.2-rc1Keir Fraser2011-01-102-2/+3
|
* x86: Fix atomic_write*() macros to correctly inform GCC that memoryKeir Fraser2011-01-081-2/+2
| | | | | | | | | | | | | it knows about is being written to. The bug is a copy-and-paste error from inline asm that writes to I/O memory. In that case, as with asm for accessign guest memory, specifying memory as a read-only parameter is acceptable because the memory cannot alias with anything that GCC reads directly. Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 22683:533d6e5c0099 xen-unstable date: Sat Jan 08 10:05:55 2011 +0000
* Update my email address to long-term stable address.Keir Fraser2011-01-0711-11/+11
| | | | | | Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 22675:0ab058a55c24 xen-unstable date: Fri Jan 07 13:30:04 2011 +0000
* kexec: correct _domain offset info in elf-notesKeir Fraser2011-01-062-4/+8
| | | | | | | | | | | | | The hypervisor writes some data structure infos into the elf note section of the vmcore to enable interpretation of the xen structures by kexec/kdump. The info of the offset of _domain in page_info was just wrong on non-ia64 systems. Signed-off-by: Juergen Gross <juergen.gross@ts.fujitsu.com> xen-unstable changeset: 22666:cb756381087c xen-unstable date: Thu Jan 06 19:02:36 2011 +0000