aboutsummaryrefslogtreecommitdiffstats
path: root/tools/libxc
Commit message (Collapse)AuthorAgeFilesLines
...
* Tools changes for per-vcpu io event channel on IA64.kaf24@firebug.cl.cam.ac.uk2006-02-241-5/+17
| | | | | | Signed-off-by Kevin Tian <Kevin.tian@intel.com>
* Clean up some vmx code.kaf24@firebug.cl.cam.ac.uk2006-02-232-5/+5
| | | | | | Signed-off-by: Xin Li <xin.b.li@intel.com>
* Per-vcpu IO evtchn patch for HVM domain.kaf24@firebug.cl.cam.ac.uk2006-02-232-5/+14
| | | | | | | | We are starting to send patches to support SMP VMX guest. Signed-off-by: Xin Li <xin.b.li@intel.com>
* Cleanups to tools since HVM domain P2M table and 1-1 table are built in xen.kaf24@firebug.cl.cam.ac.uk2006-02-211-14/+0
| | | | | | Signed-off-by: Xin Li <xin.b.li@intel.com>
* Add PAE option to HVM config file.kaf24@firebug.cl.cam.ac.uk2006-02-213-7/+12
| | | | | | | | | | | | This option is disabled by default, only if we have "pae=1" in config file, cpuid will return PAE available to VMX guest, and Linux PAE VMX guest need this. Once the PAE VMX guest support is stable, we will enable it by default. Signed-off-by: Xin Li <xin.b.li@intel.com> Signed-off-by: Jun Nakajima <jun.nakajima@intel.com>
* Fix loading binary kernel images.cl349@firebug.cl.cam.ac.uk2006-02-201-0/+1
| | | | | | | | | Starting a domain with a binary kernel image fails due to an uninitialized field. This patch fixes that problem. The Novell NetWare port to Xen 3.0 currently uses the binary image loader. Signed-off-by: Bruce Rogers <brogers@novell.com>
* New memory_op subcall XENMEM_translate_gpfn_list.kaf24@firebug.cl.cam.ac.uk2006-02-163-0/+86
| | | | | | | | | Allows translation from GPFNs to MFNs for an auto-translated guest. Signed-off-by: Keir Fraser <keir@xensource.com>
* Build the phys_to_machine_mapping array in Xen rather thankaf24@firebug.cl.cam.ac.uk2006-02-031-258/+1
| | | | | | | | | | | | | | | | | | | reusing the 1:1 page table built by the builder, and it also establishes the 1:1 direct mapping at runtime a la shadow page tables. Since the builder constructs the full 1:1 direct mapping (but <4GB), the current implementation wastes memory but cannot support guests with >=4GB memory (even for x64-64). This is also required for HVM support on the PAE host. That patch should be sent soon. For SVM, I think the svm code needs changes. Please look at the changes to vmx.c and vmcs.c; should be straightforward. Signed-off-by: Jun Nakajima <jun.nakajima@intel.com> Signed-off-by: Xiaohui Xin <xiaohui.xin@intel.com>
* Fix some more pfn/mfn/gmfn/gpfn inconsistencies. Fix some directkaf24@firebug.cl.cam.ac.uk2006-02-024-8/+8
| | | | | | | | uses of max_page variable to use the mfn_valid() predicate. Signed-off-by: Keir Fraser <keir@xensource.com>
* Big merge the HVM full-virtualisation abstractions.kaf24@firebug.cl.cam.ac.uk2006-01-317-20/+21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This changeset contains all differences between xen-unstable.hg and xen-unstable-hvm.hg. All information and comments for changesets unique to xen-unstable-hvm.hg are included below. Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> Signed-off-by: Keir Fraser <keir@xensource.com> > user: leendert@eserver2.watson.ibm.com > date: Tue Jan 31 04:29:51 2006 -0400 > files: xen/include/asm-ia64/mm.h > description: > Fix ia64 compile. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Tue Jan 31 02:21:49 2006 -0400 > files: xen/include/xen/domain_page.h > description: > Eliminate unused fields (pfn,va) warnings. > > Signed-Off-By: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Fri Jan 27 04:31:44 2006 -0400 > files: tools/python/xen/xend/image.py > description: > Name cleanup. vmx refers to VT-x specific code, HVM is used for all others. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: root@xen-trw1.amd.com > date: Sun Jan 22 18:39:58 2006 -0500 > files: xen/arch/x86/hvm/platform.c > description: > support prefix 0x67 in hvm decode logic, gfxboot patch causes 0x67 prefix. > > > user: twoller@xen-trw1.amd.com > date: Sun Jan 22 18:35:59 2006 -0500 > files: xen/arch/x86/hvm/svm/svm.c xen/arch/x86/hvm/svm/vmcb.c xen/include/asm-x86/hvm/svm/svm.h > description: > check for valid shared_page_va/vmcb before deallocating in SVM. > > > user: leendert@eserver2.watson.ibm.com > date: Sun Jan 22 02:56:20 2006 -0400 > files: xen/include/asm-x86/hvm/svm/svm.h xen/include/asm-x86/hvm/svm/vmmcall.h > description: > Some SVM header file cleanups. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Fri Jan 20 11:50:23 2006 -0400 > files: xen/arch/x86/domain.c > description: > Need to be more diligent about when to call into the HVM abstraction layer > and when not. > > Signed-Off-By: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Wed Jan 18 15:14:56 2006 -0400 > files: xen/arch/x86/hvm/svm/svm.c xen/arch/x86/hvm/svm/x86_32/exits.S xen/arch/x86/hvm/svm/x86_64/exits.S xen/arch/x86/hvm/vmx/x86_32/exits.S xen/arch/x86/hvm/vmx/x86_64/exits.S > description: > Added missing copyright statements and updated svm.c's copyright to properly > reflect that it was derived from vmx.c. > > Signed-Off-By: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Tue Jan 17 09:42:11 2006 -0400 > files: xen/arch/ia64/Makefile xen/arch/ia64/vmx/vlsapic.c xen/arch/ia64/vmx/vmx_init.c xen/include/asm-ia64/vmx_platform.h > description: > Make sure ia64 builds again with the new directory structure. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@localhost.localdomain > date: Tue Jan 17 08:28:51 2006 -0400 > files: xen/arch/x86/Makefile xen/arch/x86/hvm/i8259.c xen/arch/x86/hvm/vioapic.c > description: > The device models now belong in hvm. > > Signed-ff-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Sun Jan 15 16:40:58 2006 -0400 > files: xen/arch/x86/Makefile xen/arch/x86/cpu/amd.c xen/arch/x86/cpu/intel.c xen/arch/x86/dm/hvm_vioapic.c xen/arch/x86/dm/i8259.c xen/arch/x86/dom0_ops.c xen/arch/x86/domain.c xen/arch/x86/hvm/hvm.c xen/arch/x86/hvm/intercept.c xen/arch/x86/hvm/io.c xen/arch/x86/hvm/platform.c xen/arch/x86/hvm/svm/emulate.c xen/arch/x86/hvm/svm/instrlen.c xen/arch/x86/hvm/svm/intr.c xen/arch/x86/hvm/svm/svm.c xen/arch/x86/hvm/svm/vmcb.c xen/arch/x86/hvm/svm/x86_32/exits.S xen/arch/x86/hvm/svm/x86_64/exits.S xen/arch/x86/hvm/vlapic.c xen/arch/x86/hvm/vmx/io.c xen/arch/x86/hvm/vmx/vmcs.c xen/arch/x86/hvm/vmx/vmx.c xen/arch/x86/hvm/vmx/x86_32/exits.S xen/arch/x86/hvm/vmx/x86_64/exits.S xen/arch/x86/i387.c xen/arch/x86/x86_32/entry.S xen/arch/x86/x86_32/traps.c xen/arch/x86/x86_64/entry.S xen/arch/x86/x86_64/traps.c xen/include/asm-x86/domain.h xen/include/asm-x86/hvm/domain.h xen/include/asm-x86/hvm/hvm.h xen/include/asm-x86/hvm/io.h xen/include/asm-x86/hvm/support.h xen/include/asm-x86/hvm/svm/emulate.h xen/include/asm-x86/hvm/svm/intr.h xen/include/asm-x86/hvm/svm/svm.h xen/include/asm-x86/hvm/svm/vmcb.h xen/include/asm-x86/hvm/svm/vmmcall.h xen/include/asm-x86/hvm/vcpu.h xen/include/asm-x86/hvm/vioapic.h xen/include/asm-x86/hvm/vlapic.h xen/include/asm-x86/hvm/vmx/cpu.h xen/include/asm-x86/hvm/vmx/vmcs.h xen/include/asm-x86/hvm/vmx/vmx.h xen/include/asm-x86/hvm/vpic.h xen/include/asm-x86/hvm/vpit.h xen/include/asm-x86/shadow.h > description: > As suggested by Keir, I restructured the hvm/vmx/svm tree. The new > directory structure looks like: > > xen/arch/hvm/ > xen/arch/hvm/vmx > xen/arch/hvm/vmx/x86_32 > xen/arch/hvm/vmx/x86_64 > xen/arch/hvm/svm > xen/arch/hvm/svm/x86_32 > xen/arch/hvm/svm/x86_64 > > xen/include/hvm/ > xen/include/hvm/vmx > xen/include/hvm/svm > > Many files have been renamed and had their hvm_/vmx_/svm_ suffix removed > because this is now clear from the directory where the file resides. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Sat Jan 14 17:03:28 2006 -0400 > files: xen/arch/ia64/vmx/vlsapic.c xen/include/asm-ia64/vmx_platform.h > description: > Name change fix for ia64. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Sat Jan 14 15:12:59 2006 -0400 > files: xen/arch/x86/dm/hvm_vioapic.c xen/arch/x86/dm/i8259.c xen/arch/x86/hvm.c xen/arch/x86/hvm_intercept.c xen/arch/x86/svm.c xen/arch/x86/svm_intr.c xen/arch/x86/svm_vmcb.c xen/arch/x86/vmx.c xen/arch/x86/vmx_io.c xen/arch/x86/vmx_vmcs.c xen/include/asm-x86/hvm_domain.h xen/include/asm-x86/hvm_vcpu.h > description: > Move VMX/SVM print buffer to hvm_domain. > > Cleanup variable names. The suffix hvm_ is redundant in hvm_domain. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: twoller@xen-trw1.site > date: Fri Jan 13 17:03:18 2006 -0500 > files: xen/arch/x86/svm.c > description: > remove unnecessary spin_unlock in asid_fetch code for svm. > > > user: twoller@xen-trw1.site > date: Wed Jan 11 20:00:36 2006 -0500 > files: xen/arch/x86/svm.c > description: > remove unneeded update_pagetables() during svm PF handling (resolved with ASID code rework). > > > user: leendert@eserver2.watson.ibm.com > date: Tue Jan 10 02:45:32 2006 -0400 > files: xen/arch/x86/hvm.c xen/arch/x86/vmx_io.c > description: > Factor out cpu_get_interrupt(). It is used by VMX and SVM. > > Signed-Off-By: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Mon Jan 9 00:03:30 2006 -0400 > files: xen/arch/x86/hvm.c xen/arch/x86/svm.c xen/arch/x86/vmx.c xen/include/asm-x86/hvm_support.h xen/include/asm-x86/hvm_vcpu.h > description: > Introduce small print buffer per domain rather than a single global one. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Sun Jan 8 23:07:12 2006 -0400 > files: xen/arch/x86/dom0_ops.c xen/include/asm-x86/hvm_support.h xen/include/public/arch-x86_32.h xen/include/public/arch-x86_64.h > description: > More cleanup. There is no point in distinguishing between SVM and VMX, > a single HVM flag bit suffices. > > Signed-Off-By: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Sun Jan 8 12:05:59 2006 -0400 > files: xen/arch/x86/svm.c xen/arch/x86/vmx.c > description: > Both VMX & SVM now print writes to the debug port (0xE9) on the console. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Sat Jan 7 13:55:27 2006 -0400 > files: xen/arch/x86/svm.c xen/arch/x86/svm_intr.c xen/arch/x86/svm_vmcb.c xen/arch/x86/vmx.c xen/arch/x86/vmx_io.c xen/arch/x86/vmx_vmcs.c xen/arch/x86/x86_32/asm-offsets.c xen/arch/x86/x86_64/asm-offsets.c xen/include/asm-x86/domain.h xen/include/asm-x86/vmx.h > description: > Introduce shorthands to improve code legibility. > > Signed-Off-By: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Wed Jan 4 06:12:10 2006 -0400 > files: tools/examples/xmexample.hvm > description: > Minor spelling mistakes. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Wed Jan 4 03:37:55 2006 -0400 > files: xen/include/public/hvm/hvm_info_table.h xen/include/public/hvm/ioreq.h xen/include/public/hvm/vmx_assist.h > description: > Missed adding new files. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Mon Jan 2 01:23:54 2006 -0400 > files: tools/debugger/libxendebug/xendebug.c tools/libxc/xc_hvm_build.c > description: > Finalize Xin Li's patch: vmx/svm_identify is no longer necessary. > Xen debug should test for HVM instead of VMX. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: twoller@xen-trw1.site > date: Sun Jan 1 03:22:39 2006 -0500 > files: tools/ioemu/vl.c > description: > change hardcoded VTXEN to HVMXEN. > > > user: leendert@eserver2.watson.ibm.com > date: Sun Jan 1 02:22:47 2006 -0400 > files: tools/libxc/xc_hvm_build.c tools/python/xen/xend/image.py xen/arch/x86/domain.c > description: > Avoid xen crash if there is no VMX support. If a platform > doesn't support VMX, creating VMX domain will crash xen > HV. > > Signed-off-by: Xin Li <xin.b.li@intel.com> > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > [ vmx/svm_identify are still needed in hvm builder, but this may not > really be necessary. I need to check this. - lvd ] > > > user: twoller@xen-trw1.site > date: Fri Dec 30 21:38:56 2005 -0500 > files: xen/arch/x86/svm.c xen/arch/x86/svm_vmcb.c xen/arch/x86/x86_32/entry.S xen/include/asm-x86/svm.h xen/include/asm-x86/svm_vmcb.h > description: > add multi-core support for guest ASIDs for SVM partitions. > > > user: leendert@eserver2.watson.ibm.com > date: Sun Dec 25 20:44:43 2005 -0400 > files: tools/firmware/vmxassist/head.S > description: > Make sure vmxassist still works in its debug environment. > > Signed-Off-By: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Fri Dec 23 18:27:57 2005 -0400 > files: tools/libxc/xc_ia64_stubs.c > description: > Fixed libxc ia64, xend uses xc_hvm_build instead of xc_vmx_build. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: twoller@xen-trw1.site > date: Wed Dec 21 21:39:17 2005 -0500 > files: xen/arch/x86/svm_intr.c xen/arch/x86/svm_vmcb.c > description: > cleanup of svm specific code. > > > user: leendert@eserver2.watson.ibm.com > date: Wed Dec 21 17:18:25 2005 -0400 > files: tools/python/xen/xm/tests/test_create.py tools/xm-test/README > description: > Minor name cleanups. xm-test isn't VMX specific. Instead use HVM. > > > user: twoller@xen-trw1.site > date: Tue Dec 20 20:01:38 2005 -0500 > files: xen/arch/x86/svm_vmcb.c > description: > reword comments. > > > user: twoller@xen-trw1.site > date: Tue Dec 20 20:01:07 2005 -0500 > files: xen/arch/x86/svm_intr.c > description: > add additional VLAPIC delivery modes. > > > user: twoller@xen-trw1.site > date: Tue Dec 20 20:00:22 2005 -0500 > files: xen/arch/x86/svm.c > description: > reformat misaligned code. > > > user: twoller@xen-trw1.site > date: Tue Dec 20 19:59:37 2005 -0500 > files: xen/arch/x86/svm.c > description: > Add additional AMD SVM specific CPUID logic. > > > user: leendert@eserver2.watson.ibm.com > date: Thu Dec 15 03:06:15 2005 -0400 > files: tools/xm-test/tests/block-create/01_block_attach_device_pos.py tools/xm-test/tests/block-create/02_block_attach_file_device_pos.py tools/xm-test/tests/block-create/04_block_attach_device_repeatedly_pos.py tools/xm-test/tests/block-create/05_block_attach_and_dettach_device_repeatedly_pos.py tools/xm-test/tests/block-create/06_block_attach_baddomain_neg.py tools/xm-test/tests/block-create/07_block_attach_baddevice_neg.py tools/xm-test/tests/block-create/08_block_attach_bad_filedevice_neg.py tools/xm-test/tests/block-create/09_block_attach_and_dettach_device_check_data_pos.py tools/xm-test/tests/block-create/10_block_attach_dettach_multiple_devices.py tools/xm-test/tests/block-create/11_block_attach_shared_dom0.py tools/xm-test/tests/block-create/12_block_attach_shared_domU.py tools/xm-test/tests/block-destroy/01_block-destroy_btblock_pos.py tools/xm-test/tests/block-destroy/02_block-destroy_rtblock_pos.py tools/xm-test/tests/block-destroy/04_block-destroy_nonattached_neg.py tools/xm-test/tests/block-destroy/05_block-destroy_byname_pos.py tools/xm-test/tests/block-destroy/06_block-destroy_check_list_pos.py tools/xm-test/tests/block-list/01_block-list_pos.py tools/xm-test/tests/block-list/02_block-list_attachbd_pos.py tools/xm-test/tests/block-list/03_block-list_anotherbd_pos.py tools/xm-test/tests/block-list/04_block-list_nodb_pos.py tools/xm-test/tests/block-list/06_block-list_checkremove_pos.py tools/xm-test/tests/memmax/01_memmax_badparm_neg.py tools/xm-test/tests/memset/01_memset_basic_pos.py tools/xm-test/tests/memset/02_memset_badparm_neg.py tools/xm-test/tests/memset/03_memset_random_pos.py tools/xm-test/tests/memset/04_memset_smallmem_pos.py tools/xm-test/tests/migrate/01_migrate_localhost_pos.py tools/xm-test/tests/network-attach/01_network_attach_pos.py tools/xm-test/tests/network-attach/02_network_attach_detach_pos.py tools/xm-test/tests/network-attach/03_network_attach_detach_multiple_pos.py tools/xm-test/tests/restore/01_restore_basic_pos.py tools/xm-test/tests/restore/02_restore_badparm_neg.py tools/xm-test/tests/restore/03_restore_badfilename_neg.py tools/xm-test/tests/restore/04_restore_withdevices_pos.py tools/xm-test/tests/save/01_save_basic_pos.py tools/xm-test/tests/save/02_save_badparm_neg.py tools/xm-test/tests/save/03_save_bogusfile_neg.py tools/xm-test/tests/sysrq/01_sysrq_basic_neg.py tools/xm-test/tests/sysrq/02_sysrq_sync_pos.py tools/xm-test/tests/sysrq/03_sysrq_withreboot_pos.py > description: > Adding SKIP() to tests that aren't supported for VMX domains. > > Signed-off-by: Dan Stekloff <dsteklof@us.ibm.com> > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Tue Dec 13 22:43:47 2005 -0400 > files: xen/arch/x86/svm.c xen/arch/x86/vmx.c xen/arch/x86/vmx_io.c xen/include/asm-x86/hvm_vpit.h xen/include/asm-x86/msr.h > description: > Support VMX guest accesses to IA32_TIME_STAMP_COUNTER MSR. > > Signed-off-by: Haifeng Xue <haifeng.xue@intel.com> > Signed-off-by: Leendert van Doorn <leendert@us.ibm.com> > > > user: twoller@xen-trw1.site > date: Tue Dec 13 19:49:53 2005 -0500 > files: xen/arch/x86/svm.c xen/arch/x86/svm_emulate.c xen/arch/x86/svm_instrlen.c xen/arch/x86/svm_intr.c xen/arch/x86/svm_vmcb.c xen/include/asm-x86/svm.h xen/include/asm-x86/svm_emulate.h xen/include/asm-x86/svm_intr.h xen/include/asm-x86/svm_vmcb.h xen/include/asm-x86/svm_vmmcall.h > description: > Add SVM base files to repository. > > > user: twoller@xen-trw1.site > date: Tue Dec 13 19:49:02 2005 -0500 > files: xen/arch/x86/x86_32/entry.S xen/arch/x86/x86_64/entry.S > description: > Add SVM entry points for launch/resume. > > > user: twoller@xen-trw1.site > date: Tue Dec 13 19:47:38 2005 -0500 > files: .hgignore > description: > Add hvmloader files to ignore list. > > > user: leendert@eserver2.watson.ibm.com > date: Mon Dec 12 22:58:54 2005 -0400 > files: docs/src/user.tex tools/firmware/README xen/include/asm-x86/hvm.h > description: > Removed dirty words (by request). > > > user: leendert@eserver2.watson.ibm.com > date: Mon Dec 12 05:48:22 2005 -0400 > files: tools/firmware/hvmloader/mkhex > description: > Fix file mode. > > Signed-off-by: Leendert van Doorn <leendert@watson.ibm.com> > > > user: leendert@eserver2.watson.ibm.com > date: Mon Dec 12 04:50:42 2005 -0400 > files: xen/Rules.mk xen/arch/x86/cpu/amd.c xen/arch/x86/cpu/intel.c xen/arch/x86/dm/hvm_vioapic.c xen/arch/x86/dm/i8259.c xen/arch/x86/dom0_ops.c xen/arch/x86/domain.c xen/arch/x86/hvm.c xen/arch/x86/hvm_intercept.c xen/arch/x86/hvm_io.c xen/arch/x86/hvm_platform.c xen/arch/x86/hvm_vlapic.c xen/arch/x86/mpparse.c xen/arch/x86/shadow.c xen/arch/x86/vmx.c xen/arch/x86/vmx_io.c xen/arch/x86/vmx_vmcs.c xen/arch/x86/x86_32/asm-offsets.c xen/arch/x86/x86_32/entry.S xen/arch/x86/x86_64/asm-offsets.c xen/arch/x86/x86_64/entry.S xen/arch/x86/x86_64/mm.c xen/include/asm-x86/config.h xen/include/asm-x86/cpufeature.h xen/include/asm-x86/domain.h xen/include/asm-x86/hvm_domain.h xen/include/asm-x86/hvm_io.h xen/include/asm-x86/hvm_support.h xen/include/asm-x86/hvm_vcpu.h xen/include/asm-x86/hvm_vioapic.h xen/include/asm-x86/hvm_vlapic.h xen/include/asm-x86/hvm_vpic.h xen/include/asm-x86/hvm_vpit.h xen/include/asm-x86/mpspec.h xen/include/asm-x86/msr.h xen/include/asm-x86/processor.h xen/include/asm-x86/vmx.h xen/include/asm-x86/vmx_cpu.h xen/include/asm-x86/vmx_vmcs.h > description: > Phase 3 of HVM integration: This patchset introduces the refactoring of > virtualization architecture independent functions from specific ones. > > > user: leendert@eserver2.watson.ibm.com > date: Sun Dec 11 07:02:51 2005 -0400 > files: xen/arch/x86/dom0_ops.c xen/arch/x86/domain.c xen/arch/x86/i387.c xen/arch/x86/shadow.c xen/arch/x86/vmx.c xen/arch/x86/x86_32/traps.c xen/arch/x86/x86_64/traps.c xen/include/asm-x86/hvm.h xen/include/asm-x86/hvm_support.h xen/include/asm-x86/regs.h xen/include/asm-x86/shadow.h xen/include/asm-x86/vmx_vmcs.h > description: > Phase 2 of HVM integration: This patchset introduces the hvm interface > to the hypervisor and modifies all the non-vmx specific files to use it. > > > user: leendert@eserver2.watson.ibm.com > date: Sun Dec 11 01:10:00 2005 -0400 > files: tools/examples/Makefile tools/examples/README tools/examples/xmexample.hvm tools/ioemu/exec-all.h tools/ioemu/hw/i8254.c tools/ioemu/hw/i8259.c tools/ioemu/monitor.c tools/ioemu/target-i386-dm/helper2.c tools/ioemu/vl.c tools/libxc/Makefile tools/libxc/xc_hvm_build.c tools/libxc/xc_ptrace.c tools/libxc/xc_ptrace_core.c tools/libxc/xenguest.h tools/python/xen/lowlevel/xc/xc.c tools/python/xen/xend/image.py tools/python/xen/xm/create.py tools/xm-test/configure.ac tools/xm-test/lib/XmTestLib/XenDomain.py tools/xm-test/lib/XmTestLib/config.py.in tools/xm-test/ramdisk/Makefile.am tools/xm-test/ramdisk/bin/create_disk_image tools/xm-test/tests/block-list/04_block-list_nodb_pos.py xen/include/public/arch-x86_32.h xen/include/public/arch-x86_64.h > description: > Phase 1 of HVM integration: This patchset updates the tools. Most of the > tools are machine independent except for some detection code in the hvm > domain builder.
* Re-arrange things in the domain builder a bit so as to make sure thatsos22@douglas.cl.cam.ac.uk2006-01-301-54/+54
| | | | | | | | | | when we make a page below 4G in the domain, that gets reflected into the M2P and P2M tables. Signed-off-by: Steven Smith, sos22@cam.ac.uk
* Replace the MMUEXTOP 'pfn hole' commands with a newkaf24@firebug.cl.cam.ac.uk2006-01-284-30/+64
| | | | | | | | arch-specific XENMEM_ operation. Signed-off-by: Keir Fraser <keir@xensource.com>
* Turn down debug a bit, and generally tidy hings up a little.sos22@douglas.cl.cam.ac.uk2006-01-271-2/+0
| | | | | | | Signed-off-by: Steven Smith, sos22@cam.ac.uk
* Create a block of reserved PFNs in shadow translate mode guests, andsos22@douglas.cl.cam.ac.uk2006-01-265-46/+22
| | | | | | | | | | | | | | move the shared info and grant table pfns into that block. This allows us to remove the get_gnttablist dom0 op, and simplifies the domain creation code slightly. Having the reserved block managed by Xen may also make it slightly easier to handle the case where the grant table needs to be extended at run time. Suggested-by: kaf24 Signed-off-by: Steven Smith, sos22@cam.ac.uk
* Merge.sos22@douglas.cl.cam.ac.uk2006-01-264-213/+21
|\ | | | | | | | | | | | | Signed-off-by: Steven Smith, sos22@cam.ac.uk
| * Remove unneeded /proc/xen/grant and its libxc wrapper.kaf24@firebug.cl.cam.ac.uk2006-01-263-201/+0
| | | | | | | | | | | | Signed-off-by: Keir Fraser <keir@xensource.com>
| * Fix 64-bit build.sos22@douglas.cl.cam.ac.uk2006-01-251-12/+21
| | | | | | | | | | | | | | Signed-off-by: Steven Smith, sos22@cam.ac.uk
* | Make SMP guests work in shadow translate mode.sos22@douglas.cl.cam.ac.uk2006-01-261-3/+12
| | | | | | | | | | | | | | Signed-off-by: Steven Smith, sos22@cam.ac.uk
* | Make some basic cases of grant tables work in shadow translate mode.sos22@douglas.cl.cam.ac.uk2006-01-253-7/+48
|/ | | | | | | | | | | | | This is enough to get block devices to work. Note that this involves assigning PFNs to the machine frames used for the grant table structures. While I'm here, I also assigned a PFN to the shared info frame. Signed-off-by: Steven Smith, sos22@cam.ac.uk
* Make shadow translate mode work for unprivileged, uniprocessor guestssos22@douglas.cl.cam.ac.uk2006-01-251-63/+127
| | | | | | | | | with no devices on plain 32 bit non-PAE hosts. Signed-off-by: Steven Smith, sos22@cam.ac.uk
* Indirect hypercalls through a hypercall transfer page.kaf24@firebug.cl.cam.ac.uk2006-01-243-1/+23
| | | | | | Signed-off-by: Keir Fraser <keir@xensource.com>
* No longer call xc_vcpu_getcontext() on restore (required after cset 8610). smh22@firebug.cl.cam.ac.uk2006-01-171-7/+0
| | | | | Signed-off-by: Steven Hand <steven@xensource.com>
* xc_vcpu_getcontext() can no longer be called before akaf24@firebug.cl.cam.ac.uk2006-01-143-34/+5
| | | | | | | | | | | VCPU's context has been explicitly initialised. Fix all the domain builders to no longer attempt this. They really don't need to anyhow. Signed-off-by: Keir Fraser <keir@xensource.com>
* 8604:a51fcb5de470 introduced a discrepancy between the declarationemellor@leeni.uk.xensource.com2006-01-122-3/+4
| | | | | | | | | | and definition of xc_linux_save(). In particular the argument for the suspend pointer to function was null in one and int in the other. On inspection, int seemed to be correct, so I went with this. I also fixed up a few other cosmetic discrepancies. Signed-Off-By: Horms <horms@verge.net.au>
* Fix the build.kaf24@firebug.cl.cam.ac.uk2006-01-101-7/+8
| | | | | | Signed-off-by: Keir Fraser <keir@xensource.com>
* Merged.emellor@leeni.uk.xensource.com2006-01-102-0/+4
|\
| * Proactively check for NULL strings passed into xc_linx_build. Either dokaf24@firebug.cl.cam.ac.uk2006-01-102-2/+8
| | | | | | | | | | | | | | | | | | the right thing or return error if detected. A NULL cmdline, for example, would currently generate a segfault. Signed-off-by: Ben Thomas <bjthomas3@gmail.com>
* | Proactively check for NULL strings passed into xc_linux_build. Either DTRTemellor@leeni.uk.xensource.com2006-01-101-3/+7
|/ | | | | | | | or return error if detected. A NULL cmdline, for example, would currently generate a segfault. Signed-off-by: Ben Thomas <bjthomas3@gmail.com>
* Extend the xc_linux_save interface to take a callback function for handling theemellor@leeni.uk.xensource.com2006-01-103-16/+12
| | | | | | | | | suspend, and push the printf("suspend") out of xc_linux_save and into xc_save. This means that xc_linux_save can be used without the xc_save wrapper if desired. Signed-off-by: Ewan Mellor <ewan@xensource.com>
* Merged.emellor@leeni.uk.xensource.com2006-01-0911-134/+189
|\
| * Fix a couple of bogus dom0_op names:kaf24@firebug.cl.cam.ac.uk2006-01-0610-67/+66
| | | | | | | | | | | | | | | | | | setdomaininfo -> setvcpucontext pincpudomain -> setvcpuaffinity Signed-off-by: Keir Fraser <keir@xensource.com>
| * Marge with xen-ia64-unstable.hgkaf24@firebug.cl.cam.ac.uk2006-01-033-42/+34
| |\
| | * Move public hvm interfaces into xen/include/public/hvm.kaf24@firebug.cl.cam.ac.uk2006-01-032-5/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add new header hvm_info_table.h for defining location and contents of acpi-style hvm_info_table. Remove duplicate definition in vmxassist/acpi_madt.c. Signed-off-by: Keir Fraser <keir@xensource.com>
| | * Rename VMX option name lapic to apic, and pass it to xen bykaf24@firebug.cl.cam.ac.uk2006-01-032-37/+24
| | | | | | | | | | | | | | | | | | | | | | | | | | | hvm_info_table. Previous we pass it to xen by guest vcpu context ECX register, now we unify to use hvm_info_table. Signed-off-by: Xin Li <xin.b.li@intel.com>
| * | Adapt xen-ia64 to changes in xen-unstabledjm@kirby.fc.hp.com2006-01-031-0/+1
| | |
| * | Mergedjm@kirby.fc.hp.com2006-01-036-41/+310
| |\|
| | * Provide an option to disable ACPI from the VMX config file.kaf24@firebug.cl.cam.ac.uk2006-01-012-16/+47
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | By default ACPI is disabled. Signed-off-by: Yu Ke <ke.yu@intel.com> Signed-off-by: Jun Nakajima <jun.nakajima@intel.com> Signed-off-by: Nitin A Kamble <nitin.a.kamble@intel.com>
| | * Allow non-privileged domains restricted access tokaf24@firebug.cl.cam.ac.uk2005-12-312-0/+43
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | I/O memory and physical interrupts, under control of domain0. Capabilities are maintained as rangesets in Xen. Signed-off-by: Ryan Wilson <hap9@epoch.ncsc.mil> Signed-off-by: Keir Fraser <keir@xensource.com>
| | * Avoid xen crash if there is no VMX support. If a platformkaf24@firebug.cl.cam.ac.uk2005-12-301-25/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | doesn't support VMX, creating VMX domain will crash xen HV. Signed-off-by: Xin Li <xin.b.li@intel.com>
| * | Plumb through nr_pages -- needed for correct balloon driver functiondjm@kirby.fc.hp.com2005-12-301-0/+1
| | |
| * | Ensure initrd fields are set to 0 when no initrd is present (by Kevin Tian)djm@kirby.fc.hp.com2005-12-291-0/+3
| | |
* | | Added missing munmap for live_p2m_frame_list_list.emellor@leeni.uk.xensource.com2006-01-091-0/+3
| |/ |/| | | | | | | Signed-off-by: Ewan Mellor <ewan@xensource.com>
* | Add support to xenctx for printing stack traces on x86_32 and x86_64.Ian.Campbell@xensource.com2005-12-223-0/+210
|/ | | | | | | | | To support this add xc_translate_foreign_address to libxc. This function walks page tables and translates virtual addresses using a given domain and vcpu page table. Signed-off-by: Ian Campbell <Ian.Campbell@XenSource.com>
* Mergedjm@kirby.fc.hp.com2005-12-215-206/+373
|\
| * This patch fix several issue to support >2G 64bit vmx guest in IA-32ekaf24@firebug.cl.cam.ac.uk2005-12-201-7/+8
| | | | | | | | | | | | | | | | | | | | | | | | platform, it includes: 1) One fix on xc_vmx_build.c 2) Change ram_size/phys_ram_size in qemu from int to uint64_t 3) One fix on pcnet unsigned short to unsigned long conversion. Signed-off-by: Yunhong Jiang <yunhong.jiang@intel.com> Signed-off-by: Xin Li <xin.b.li@intel.com>
| * Add debugging flag for domains to make domu debugging a run-time optionkaf24@firebug.cl.cam.ac.uk2005-12-151-6/+16
| | | | | | | | | | | | Signed-off-by: Kip Macy kmacy@fsmware.ckm
| * Add MP debug support to gdbserver.kaf24@firebug.cl.cam.ac.uk2005-12-154-198/+354
| | | | | | | | | | | | Signed-off-by: Kip Macy <kip.macy@gmail.com>
* | diff -r 545ba1b126ca tools/libxc/xc_linux_build.cdjm@kirby.fc.hp.com2005-12-211-3/+45
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | --- a/tools/libxc/xc_linux_build.c Tue Dec 20 20:11:17 2005 +++ b/tools/libxc/xc_linux_build.c Wed Dec 21 11:50:08 2005 @@ -296,9 +296,13 @@ unsigned long *page_array = NULL; struct load_funcs load_funcs; struct domain_setup_info dsi; + unsigned long vinitrd_start; + unsigned long vinitrd_end; + unsigned long v_end; unsigned long start_page, pgnr; start_info_t *start_info; int rc; + unsigned long i; rc = probeimageformat(image, image_size, &load_funcs); if ( rc != 0 ) @@ -310,11 +314,13 @@ if ( rc != 0 ) goto error_out; - dsi.v_start = round_pgdown(dsi.v_start); - dsi.v_end = round_pgup(dsi.v_end); + dsi.v_start = round_pgdown(dsi.v_start); + vinitrd_start = round_pgup(dsi.v_end); + vinitrd_end = vinitrd_start + initrd_len; + v_end = round_pgup(vinitrd_end); start_page = dsi.v_start >> PAGE_SHIFT; - pgnr = (dsi.v_end - dsi.v_start) >> PAGE_SHIFT; + pgnr = (v_end - dsi.v_start) >> PAGE_SHIFT; if ( (page_array = malloc(pgnr * sizeof(unsigned long))) == NULL ) { PERROR("Could not allocate memory"); @@ -326,9 +332,38 @@ PERROR("Could not get the page frame list"); goto error_out; } + +#define _p(a) ((void *) (a)) + + printf("VIRTUAL MEMORY ARRANGEMENT:\n" + " Loaded kernel: %p->%p\n" + " Init. ramdisk: %p->%p\n" + " TOTAL: %p->%p\n", + _p(dsi.v_kernstart), _p(dsi.v_kernend), + _p(vinitrd_start), _p(vinitrd_end), + _p(dsi.v_start), _p(v_end)); + printf(" ENTRY ADDRESS: %p\n", _p(dsi.v_kernentry)); (load_funcs.loadimage)(image, image_size, xc_handle, dom, page_array, &dsi); + + /* Load the initial ramdisk image. */ + if ( initrd_len != 0 ) + { + for ( i = (vinitrd_start - dsi.v_start); + i < (vinitrd_end - dsi.v_start); i += PAGE_SIZE ) + { + char page[PAGE_SIZE]; + if ( gzread(initrd_gfd, page, PAGE_SIZE) == -1 ) + { + PERROR("Error reading initrd image, could not"); + goto error_out; + } + xc_copy_to_domain_page(xc_handle, dom, + page_array[i>>PAGE_SHIFT], page); + } + } + *pvke = dsi.v_kernentry; @@ -358,6 +393,13 @@ start_info->store_evtchn = store_evtchn; start_info->console_mfn = nr_pages - 1; start_info->console_evtchn = console_evtchn; + if ( initrd_len != 0 ) + { + ctxt->initrd.start = vinitrd_start; + ctxt->initrd.size = initrd_len; + } + strncpy((char *)ctxt->cmdline, cmdline, IA64_COMMAND_LINE_SIZE); + ctxt->cmdline[IA64_COMMAND_LINE_SIZE-1] = '\0'; munmap(start_info, PAGE_SIZE); free(page_array); diff -r 545ba1b126ca xen/arch/ia64/xen/dom_fw.c --- a/xen/arch/ia64/xen/dom_fw.c Tue Dec 20 20:11:17 2005 +++ b/xen/arch/ia64/xen/dom_fw.c Wed Dec 21 11:50:08 2005 @@ -861,9 +861,14 @@ bp->console_info.orig_x = 0; bp->console_info.orig_y = 24; bp->fpswa = 0; - bp->initrd_start = (dom0_start+dom0_size) - - (PAGE_ALIGN(ia64_boot_param->initrd_size) + 4*1024*1024); - bp->initrd_size = ia64_boot_param->initrd_size; + if (d == dom0){ + bp->initrd_start = (dom0_start+dom0_size) - + (PAGE_ALIGN(ia64_boot_param->initrd_size) + 4*1024*1024); + bp->initrd_size = ia64_boot_param->initrd_size; + }else{ + bp->initrd_start = d->arch.initrd_start; + bp->initrd_size = d->arch.initrd_len; + } printf(" initrd start %0xlx", bp->initrd_start); printf(" initrd size %0xlx", bp->initrd_size); diff -r 545ba1b126ca xen/arch/ia64/xen/domain.c --- a/xen/arch/ia64/xen/domain.c Tue Dec 20 20:11:17 2005 +++ b/xen/arch/ia64/xen/domain.c Wed Dec 21 11:50:08 2005 @@ -297,6 +297,9 @@ *regs = c->regs; d->arch.sys_pgnr = c->sys_pgnr; + d->arch.initrd_start = c->initrd.start; + d->arch.initrd_len = c->initrd.size; + d->arch.cmdline = c->cmdline; new_thread(v, regs->cr_iip, 0, 0); v->vcpu_info->arch.evtchn_vector = c->vcpu.evtchn_vector; @@ -365,7 +368,7 @@ regs->r28 = dom_fw_setup(d,saved_command_line,256L); else { regs->ar_rsc |= (2 << 2); /* force PL2/3 */ - regs->r28 = dom_fw_setup(d,"nomca nosmp xencons=tty0 console=tty0 root=/dev/hda1",256L); //FIXME + regs->r28 = dom_fw_setup(d,d->arch.cmdline,256L); } VCPU(v, banknum) = 1; VCPU(v, metaphysical_mode) = 1; diff -r 545ba1b126ca xen/include/asm-ia64/domain.h --- a/xen/include/asm-ia64/domain.h Tue Dec 20 20:11:17 2005 +++ b/xen/include/asm-ia64/domain.h Wed Dec 21 11:50:08 2005 @@ -38,6 +38,9 @@ u64 image_len; u64 entry; #endif + unsigned long initrd_start; + unsigned long initrd_len; + char *cmdline; }; #define xen_vastart arch.xen_vastart #define xen_vaend arch.xen_vaend diff -r 545ba1b126ca xen/include/public/arch-ia64.h --- a/xen/include/public/arch-ia64.h Tue Dec 20 20:11:17 2005 +++ b/xen/include/public/arch-ia64.h Wed Dec 21 11:50:08 2005 @@ -276,6 +276,12 @@ unsigned long start_info_pfn; } arch_shared_info_t; +typedef struct { + unsigned long start; + unsigned long size; +} arch_initrd_info_t; + +#define IA64_COMMAND_LINE_SIZE 512 typedef struct vcpu_guest_context { #define VGCF_FPU_VALID (1<<0) #define VGCF_VMX_GUEST (1<<1) @@ -289,6 +295,8 @@ cpu_user_regs_t regs; arch_vcpu_info_t vcpu; arch_shared_info_t shared; + arch_initrd_info_t initrd; + char cmdline[IA64_COMMAND_LINE_SIZE]; } vcpu_guest_context_t; #endif /* !__ASSEMBLY__ */
* | Small patch to avoid a stack overflow (VTI only).djm@kirby.fc.hp.com2005-12-151-2/+10
|/ | | | | Signed-off-by: Tristan Gingold <tristan.gingold@bull.net>
* Make version strings consistent across all interfaces.cl349@firebug.cl.cam.ac.uk2005-12-041-1/+1
| | | | | Signed-off-by: Christian Limpach <Christian.Limpach@cl.cam.ac.uk>