lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 26 Oct 2010 20:55:33 +0100
From:	Stefano Stabellini <stefano.stabellini@...citrix.com>
To:	Linus Torvalds <torvalds@...ux-foundation.org>
CC:	linux-kernel@...r.kernel.org, xen-devel@...ts.xensource.com,
	Jeremy Fitzhardinge <jeremy@...p.org>,
	Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>
Subject: [GIT PULL] xen PV on HVM and initial domain

Linus,
I have two patch series that I would like you to pull:

PV on HVM: receive interrupts as xen events [1]
xen: initial domain support [2]

Please pull from the following branch:

git://xenbits.xen.org/people/sstabellini/linux-pvhvm.git for-linus

it contains both series rebased on Konrad's xen-pcifront series [3]
(they depend on it, unfortunately I cannot produce a working series
without it) on Linux 2.6.36 rc8; my two patch series start after git
commit 67ba37293e938208795d6a3562201bdb0cf43393.

The first patch series introduces some performance improvements for Xen
PV on HVM guests: interacting with the emulated APIC is slow because it
causes traps in the hypervisor while receiving Xen events using the
vector callback mechanism allow us to skip all that. For this reason we
remap interrupts and MSIs into Xen pirqs so that from that point on we
can receive them as Xen events instead.

The second patch series implements the basic support needed to boot
Linux as initial domain on Xen: the target is not to add full featured
dom0 support in the kernel but to be able to boot Linux on Xen on
native.

I have just added a last minute fix at end to solve a vcpu
initialization problem for pv guests (they would see only a single vcpu
even though they are given more than one [4]).


All together the two series introduce the following changes:

Jeremy Fitzhardinge (5):
      acpi: use indirect call to register gsi in different modes
      xen: add xen hvm acpi_register_gsi variant
      xen: remap GSIs as pirqs when running as initial domain
      xen: map a dummy page for local apic and ioapic in xen_set_fixmap
      xen: make hvc_xen console work for dom0.

Juan Quintela (2):
      xen: Initialize xenbus for dom0.
      xen: add the direct mapping area for ISA bus access

Qing He (1):
      xen: remap MSIs into pirqs when running as initial domain

Stefano Stabellini (10):
      xen: support pirq != irq
      xen: get the maximum number of pirqs from xen
      xen: implement xen_hvm_register_pirq
      xen: support GSI -> pirq remapping in PV on HVM guests
      xen: map MSIs into pirqs
      xen: introduce XEN_DOM0 as a silent option
      xen: use vcpu_ops to setup cpu masks
      xen: mask the MTRR feature from the cpuid
      xen: add a missing #include to arch/x86/pci/xen.c
      xen: initialize cpu masks for pv guests in xen_smp_init

 arch/x86/include/asm/acpi.h       |    3 +
 arch/x86/include/asm/xen/pci.h    |   12 ++
 arch/x86/kernel/acpi/boot.c       |   60 +++++--
 arch/x86/pci/xen.c                |  308 ++++++++++++++++++++++++++++++++++--
 arch/x86/xen/Kconfig              |   10 ++
 arch/x86/xen/enlighten.c          |    2 +
 arch/x86/xen/mmu.c                |   47 ++++++-
 arch/x86/xen/setup.c              |    3 +
 arch/x86/xen/smp.c                |   26 +++
 drivers/char/hvc_xen.c            |   98 ++++++++----
 drivers/xen/events.c              |  195 +++++++++++++++++++++---
 drivers/xen/xenbus/xenbus_probe.c |   29 ++++-
 include/xen/events.h              |    8 +
 include/xen/interface/features.h  |    3 +
 include/xen/interface/physdev.h   |   46 ++++++
 15 files changed, 758 insertions(+), 92 deletions(-)

Cheers,

Stefano

---
[1] http://lkml.org/lkml/2010/10/12/246 
[2] http://lkml.org/lkml/2010/10/19/199
[3] http://lkml.org/lkml/2010/10/26/231
[4] http://lkml.org/lkml/2010/10/26/369 
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ