aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Using "make install" causes a distro specific scriptIan Campbell2007-09-191-1/+4
| | | | | | | | | | | (/sbin/installkernel) to be called since linux-2.6.18-xen.hg 211:c1f5d027adf7. Unfortunately on some distros this script is broken for non-root use. Our needs are pretty simple anyway so just open code the installation of the kernel. Signed-off-by: Ian Campbell <ian.campbell@xensource.com>
* [shadow] Be smarter about what we check to avoid unnecessary brute-force ↵George Dunlap2007-09-191-28/+31
| | | | | | | | | | | | | | | | | searches The old code checked only if the page was still a pagetable before doing a brute-force search, rather than checking if it was still shadowed as the type indicated. This meant that if a page was shadowed as two different types, it was guaranteed to do a full brute-force search even if all references could be found by up-pointers. This checks the proper thing so that it will only do a brute-force if necessary. It also re-orders the unshadows so that higher levels are done first. In many cases, lower-level shadows will be destroyed in the process of higher-level shadows being destroyed, again saving brute-force searches.
* [SHADOW] Use fast-unshadow for early_unshadow heuristic.George Dunlap2007-09-191-1/+1
|
* hvm: hvm_{load,store}_cpu_guest_regs() does not touch segmentkfraser@localhost.localdomain2007-09-1910-90/+80
| | | | | | | selectors. We have separate accessors for that now. It is now an invariant that guest_cpu_user_regs()->{cs,ds,es,fs,gs,ss} are invalid for an HVM guest. Signed-off-by: Keir Fraser <keir@xensource.com>
* PCI passthru various Xen changes.kfraser@localhost.localdomain2007-09-196-11/+53
| | | | | Signed-off-by: Allen Kay <allen.m.kay@intel.com> Signed-off-by: Guy Zana <guy@neocleus.com>
* PCI passthru: VT-d I/O hooks.kfraser@localhost.localdomain2007-09-198-9/+180
| | | | | Signed-off-by: Allen Kay <allen.m.kay@intel.com> Signed-off-by: Guy Zana <guy@neocleus.com>
* IRQ injection changes for HVM PCI passthru.kfraser@localhost.localdomain2007-09-1812-58/+173
| | | | | Signed-off-by: Allen Kay <allen.m.kay@intel.com> Signed-off-by: Guy Zana <guy@neocleus.com>
* Log an error when enabling shadow mode fails for live relocation.kfraser@localhost.localdomain2007-09-181-7/+12
| | | | Signed-off-by: Doug Merrill <dpmerrill@novell.com>
* Evaluate XEN_GUEST_HANDLE_64 twice.kfraser@localhost.localdomain2007-09-181-1/+2
| | | | | | | | This fixes a build error for PV guests (OpenBSD, NetBSD) where the use of XEN_GUEST_HANDLE_64(uint8_t) leads to a build error because uint8_t is a #define and not a typedef. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
* xm: Extend width of ID in 'xm list --label' to 5 digitskfraser@localhost.localdomain2007-09-181-2/+2
| | | | Signed-off-by: Masaki Kanno <kanno.masaki@jp.fujitsu.com>
* [VTPM] VTPM manager -- Fix parameter checkkfraser@localhost.localdomain2007-09-181-1/+1
| | | | | | | | | | | | | | | | | | | | | | If vtpm_managed is started with the same vtpm instance, the following error occurs. ++++++++++++ Loading NVM. Sending LoadNVM command INFO[VTSP]: Unbinding 256 bytes of data. ERROR in VTSP_Unbind at vtsp.c:719 code: TPM_BAD_PARAMETER. ERROR in envelope_decrypt at securestorage.c:156 code:TPM_BAD_PARAMETER. ERROR[VTPM]: Failed to envelope decrypt data .ERROR in VTPM_Handle_Load_NVM at securestorage.c:284 code: TPM_BAD_PARAMETER. ERROR[VTPM]: Failed to load NVM .INFO[VTPM]: [VTPM Listener]: VTPM Listener waiting for messages. Reading LoadNVM header ++++++++++++ Signed-off-by: Kouichi YASAKI <yasaki.kouichi@jp.fujitsu.com>
* [VTPM] Fix vTPM function in HVM domainkfraser@localhost.localdomain2007-09-181-3/+29
| | | | | | | In Windows on HVM domain, GetPubkey function and Seal function become an error. Signed-off-by: Kouichi YASAKI <yasaki.kouichi@jp.fujitsu.com>
* Intercept TS on SVM.Steven Hand2007-09-181-1/+2
| | | | Signed-off-by: Steven Hand <steven@xensource.com>
* Revert 15826:447db1235adf1bc59bbd76c951716c3df7ee8843.kfraser@localhost.localdomain2007-09-181-7/+0
| | | | | | | Re-enables NMI delivery in HVM guests now that hardware task switching is emulated. Signed-off-by: Keir Fraser <keir@xensource.com>
* hvm: Support hardware task switching.kfraser@localhost.localdomain2007-09-185-80/+473
| | | | Signed-off-by: Keir Fraser <keir@xensource.com>
* hvm: New HVM function hvm_set_segment_register().kfraser@localhost.localdomain2007-09-174-15/+156
| | | | Signed-off-by: Keir Fraser <keir@xensource.com>
* [XEN] p2m: internal p2m_set_entry() function uses types rather thanTim Deegan2007-09-171-10/+9
| | | | | having callers decode them. Signed-off-by: Tim Deegan <Tim.Deegan@xensource.com>
* Intel vt-d specific changes in arch/x86/hvm/vmx/vtd.kfraser@localhost.localdomain2007-09-149-0/+3562
| | | | | Signed-off-by: Allen Kay <allen.m.kay@intel.com> Signed-off-by: Guy Zana <guy@neocleus.com>
* PCI passthru: tools changes (generic and vt-d)kfraser@localhost.localdomain2007-09-1411-12/+732
| | | | | | | | | | | | | I have added CONFIG_PASSTHROUGH in ioemu/Makefile.target and ioemu/hw/pc.c in attached vtd_tools2.patch. This should turn off libpci usage by default until user specifically enables it. This can be safely check-in without breaking builds for people who do not care about pass-through devices. I will try to think of a better way to enable this. Signed-off-by: Allen Kay <allen.m.kay@intel.com> Signed-off-by: Guy Zana <guy@neocleus.com>
* x86: fix NUMA code for 32bitkfraser@localhost.localdomain2007-09-141-9/+9
| | | | | | | | | | I don't know how significant this is (most of the NUMA node data seems unused at this point), but anyway: enable proper operation of NUMA emulation and the fake NUMA node in case there's no SRAT table on x86-32. This will at least make the "Faking node ..." message not print confusing information anymore. Signed-off-by: Jan Beulich <jbeulich@novell.com>
* qemu-dm: fix block-raw io debug printkfraser@localhost.localdomain2007-09-141-5/+5
| | | | Signed-off-by: Yosuke Iwamatsu <y-iwamatsu@ab.jp.nec.com>
* Fix xm dump-core command for paused domain.kfraser@localhost.localdomain2007-09-142-6/+13
| | | | Signed-off-by: Masaki Kanno <kanno.masaki@jp.fujitsu.com>
* Fix 'xm reboot'kfraser@localhost.localdomain2007-09-141-1/+1
| | | | Signed-off-by: Jim Fehlig <jfehlig@novell.com>
* Fix two memory leaks in xend.kfraser@localhost.localdomain2007-09-142-0/+2
| | | | Signed-off-by: Kouya Shimura <kouya@jp.fujitsu.com>
* Let Xen cmdline boolean options be specified as "=0", "=1", "=false", "=true".kfraser@localhost.localdomain2007-09-141-1/+4
| | | | Signed-off-by: Keir Fraser <keir@xensource.com>
* [XEN] add typed p2m entry-setting functionTim Deegan2007-09-142-6/+12
| | | | | keeping the old one as a fallback for RAM mappings. Signed-off-by: Tim Deegan <Tim.Deegan@xensource.com>
* Generic and VT-d specific Xen header changes for PCI passthru.kfraser@localhost.localdomain2007-09-1212-1/+690
| | | | | Signed-off-by: Allen Kay <allen.m.kay@intel.com> Signed-off-by: Guy Zana <guy@neocleus.com>
* x86: allow Dom0 to drive PC speakerkfraser@localhost.localdomain2007-09-123-9/+57
| | | | | | | as long as Xen doesn't itself make use of PIT channel 2. Signed-off-by: Jan Beulich <jbeulich@novell.com> Signed-off-by: Keir Fraser <keir@xensource.com>
* [XEN] Fix assert in typed p2m codeTim Deegan2007-09-121-1/+1
| | | | | as spotted by GCC-4's enthusiastic warnings. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
* docs: Fix typos.kfraser@localhost.localdomain2007-09-122-12/+12
| | | | Signed-off-by: Atsushi SAKAI <sakaia@jp.fujitsu.com>
* [xm-test] Set "console=xvc0" for xm-test guests on Intel architecture platforms.James Bulpin2007-09-111-1/+6
| | | | | | | Tests have been failing because the console for the test ramdisk wasn't using xvc0 so testcases were not able to interact with it. Signed-off-by: James Bulpin <james@xensource.com>
* [QEMU] Enhance raw io reliabilitykfraser@localhost.localdomain2007-09-111-2/+92
| | | | | | | | | For raw block device only : log any I/O error and perform automatic read retry for CDrom (improves MediaCheck with old installers). Signed-off-by: Ben Guthro <bguthro@virtualiron.com> Signed-off-by: Josh Nicholas <jnicholas@virtualiron.com>
* qemu: Backport qemu vnc/event-loop fix from upstream.kfraser@localhost.localdomain2007-09-111-6/+22
| | | | Signed-off-by: Keir Fraser <keir@xensource.com>
* hvmloader: ACPI DSDT dynamically indicates presence of COM1/COM2 portskfraser@localhost.localdomain2007-09-113-431/+509
| | | | | according to qemu emulation. Signed-off-by: Keir Fraser <keir@xensource.com>
* Fix memory leak in xendkfraser@localhost.localdomain2007-09-111-0/+1
| | | | | | | | | | | | | | I found that xend's memory usage grows considerably when running a script such as while true; do xm new foo ; sleep 2s; xm delete foo ; sleep 2s; done XendAPIStore maintains a list of class instances and in the case of new/create operation, an associated VMMetrics object is stashed in the list but never removed on delete/shutdown. This patch removes the instance by invoking XendBase.destroy() method. Signed-off-by: Jim Fehlig <jfehlig@novell.com>
* Add 'type vnc' to vfb device sexpr for HVM guestkfraser@localhost.localdomain2007-09-111-0/+1
| | | | | | | | | | | | | | | | | | | | This patch adds 'type vnc' to vfb device sexpr for HVM guests. PV guests already contain this entry in sexpr, e.g. (device (vfb (vncunused 1) ... (type vnc) ... ) ) Some tools, such as libvirt, look for device/vfb/type in sexpr before publishing VNC port. More importantly, this patch provides consistency in vfb device sexpr between HVM and PV guests. Signed-off-by: Jim Fehlig <jfehlig@novell.com>
* Xend: "shadow_memory" setting in xm config is in MiB, not bytes.Tim Deegan2007-09-113-2/+3
| | | | Signed-off-by: Tim Deegan <Tim.Deegan@xensource.com>
* x86: Clean up asm keyword usage (asm volatile rather than __asm__kfraser@localhost.localdomain2007-09-1111-128/+146
| | | | | | | | | | | | | | | | __volatile__ in most places) and ensure we use volatile keyword wherever we have an asm stmt that produces outputs but has other unspecified side effects or dependencies other than the explicitly-stated inputs. Also added volatile in a few places where its not strictly necessary but where it's unlikely to produce worse code and it makes our intentions perfectly clear. The original problem this patch fixes was tracked down by Joseph Cihula <joseph.cihula@intel.com>. Signed-off-by: Keir Fraser <keir@xensource.com>
* x86: Use halt() macro instead of direct HLT asm.kfraser@localhost.localdomain2007-09-114-6/+9
| | | | Signed-off-by: Keir Fraser <keir@xensource.com>
* xenstore: Remove incorrect comment.kfraser@localhost.localdomain2007-09-112-2/+0
| | | | Signed-off-by: Keir Fraser <keir@xensource.com>
* merge with xen-unstable.hg (staging)Alex Williamson2007-09-1027-244/+485
|\
| * x86: Cleanup system restart code, and wait 10ms for APs to offline.kfraser@localhost.localdomain2007-09-103-14/+15
| | | | | | | | | | Signed-off-by: Joseph Cihula <joseph.cihula@intel.com> Signed-off-by: Keir Fraser <keir@xensource.com>
| * x86: Handle 'self-IPI' on legacy UP systems with no APIC.kfraser@localhost.localdomain2007-09-101-0/+13
| | | | | | | | Signed-off-by: Keir Fraser <keir@xensource.com>
| * Change prototype of machine_restart to void machine_restart(void).kfraser@localhost.localdomain2007-09-107-8/+8
| | | | | | | | Signed-off-by: Keir Fraser <keir@xensource.com>
| * vmx: Sync with SVM TPR/CR8 changes.kfraser@localhost.localdomain2007-09-101-8/+21
| | | | | | | | Signed-off-by: Keir Fraser <keir@xensource.com>
| * svm: Greatly reduce total number of CR8 interceptskfraser@localhost.localdomain2007-09-103-14/+61
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This patch reduces the number of CR8 intercept to a fraction of the number of CR8 intercepts without. First, CR8 read intercepts are completely disabled since the SVM vTPR is kept kept in sync with the HVM vLAPIC TPR. Second, CR8 write intercepts are enabled and disabled based upon certain conditions. Most of the time, CR8 write intercepts are disabled. They are enabled only when there is a pending interrupt that can't be delivered because of either the current ISR or TPR (aka PPR) because this is the only time the TPR matters. With this patch, the number of CR8 intercepts dropped from around 10,000,000 to around 6,000 during boot of Windows 2003 Server 64-bit (this is a rough estimate). Signed-off-by: Travis Betak <travis.betak@amd.com> Signed-off-by: Keir Fraser <keir@xensource.com>
| * [HVM] Add type information to the p2m map.Tim Deegan2007-09-1012-184/+363
| | | | | | | | | | | | | | This is a base for memory tricks like page sharing, copy-on-write, lazy allocation etc. It should also make pass-through MMIO easier to implement in the p2m. Signed-off-by: Tim Deegan <Tim.Deegan@xensource.com>
| * [libxen] Compilation fix.kfraser@localhost.localdomain2007-09-101-1/+1
| | | | | | | | | | | | | | On a clean system where no prior dev. version of libxen was installed, the compilation fails due to a wrong include. This fixes it. Signed-off-by: Stefan Berger <stefanb@us.ibm.com>
| * Remove dead code in acpi sleep.kfraser@localhost.localdomain2007-09-101-15/+0
| | | | | | | | Signed-off-by Kevin Tian <kevin.tian@intel.com>
| * Install xen/xsm headers to .../usr/include/xen/xsm/kfraser@localhost.localdomain2007-09-081-0/+3
| | | | | | | | Signed-off-by: Ben Guthro <bguthro@virtualiron.com>