NOTE: At the moment, none of the vACPI WMI objects are
getting invoked as the keyboard controller is not wired to generate
acpi interrupt. Once we add support to pass non-wmi hotkey events to guest, this
vACPI layer WMI objects will be invoked.
Jean Guyader [Mon, 9 Mar 2009 14:31:32 +0000 (14:31 +0000)]
Import changeset 18788 from xen-unstable.
x86, hvm: Fix domain restore bug with Intel VLAPIC acceleration.
r18383 mark video memory as ram, and make all valid pages migrated,
including vlapic page (0xFEE00), and share page(0xFFFFF).
An extra memory population for lapic page would override previous
mapping then cause HVM guest with vlapic acceleration hang.
Ross Philipson [Wed, 4 Mar 2009 15:12:44 +0000 (10:12 -0500)]
Modification to RMRR workaround to include all 4GB when
iommu_inclusive_mapping=1. This handles cases where max usable
RAM is potentially less than some reserved ranges.
[build] Make the xenclient-xen-clean target work.
This removes files generated by the acpica/iasl compiler from the clean target.
Also disable the download+install of the acpica package, which tries to write to /usr/bin.
prashanth [Fri, 27 Feb 2009 19:18:36 +0000 (11:18 -0800)]
[build] Make the ioemu build use the headers/libs from pciutils headers/libs from buildroot, instead of the host system.
This is accompanied by fixes to build.git and ioemu.git.
Ross Philipson [Sat, 21 Feb 2009 19:03:06 +0000 (14:03 -0500)]
Add iommu_include_reserved boolean parameter to allow reserved memory
to be included in iommu mappings (not included by default). Also adds
a warning when the RMRRs do not match the system memory map.
Changes to be committed:
modified: xen/drivers/passthrough/vtd/iommu.c
modified: xen/drivers/passthrough/vtd/dmar.c
Ross Philipson [Fri, 20 Feb 2009 20:03:42 +0000 (15:03 -0500)]
Added reserved memory from e820 map to pages mapped into IOMMUs for
dom0. This is for broken BIOS issues where the RMRRs do not report
the correct reserved ranges for devices.
Changes to be committed:
modified: xen/arch/ia64/xen/mm.c
modified: xen/arch/x86/mm.c
modified: xen/arch/x86/setup.c
modified: xen/arch/x86/tboot.c
modified: xen/drivers/passthrough/vtd/iommu.c
modified: xen/drivers/video/vga.c
modified: xen/include/xen/mm.h
Ross Philipson [Fri, 13 Feb 2009 20:14:36 +0000 (15:14 -0500)]
Patch to revert parts of the tboot patches from Wed Feb 4 10:47:48.
This addresses the hang on the Lenovo laptops. More investigation
needs to be done as to why the hang occurs since the original changes
are not really incorrect. For not this will prevent the hang.
Changes to be committed:
modified: xen/arch/x86/setup.c
modified: xen/arch/x86/tboot.c
modified: xen/drivers/passthrough/vtd/iommu.c
OEM value add (hotkeys, special button support). vACPI layer
and xenpmd changes. (patch 4/5).
The vACPI layer is specific to hp 6930p but support for other
oems, models call be added with minimal effort as all the components
except for the asl code is the same for all oems.
Ross Philipson [Wed, 4 Feb 2009 19:13:30 +0000 (14:13 -0500)]
Changes to boot code to relocate the MBI.
This fix relocates the MBI and associated data to safe
memory locations before paging is enabled. This fixes the
issue with GRUB2 loading chunks of the MBI at very high
phys. addresses. These fixes are from xen-unstable change-
sets 19146 and 19158.
Changes to be committed:
(use "git reset HEAD <file>..." to unstage)
modified: xen/arch/x86/Makefile
modified: xen/arch/x86/boot/Makefile
new file: xen/arch/x86/boot/build32.mk
modified: xen/arch/x86/boot/head.S
new file: xen/arch/x86/boot/reloc.c
Ross Philipson [Wed, 4 Feb 2009 16:17:52 +0000 (11:17 -0500)]
tboot patch 5/5 - use protected DMAR
The VT-d DMAR ACPI tables may not be DMA protected by tboot.
However, SINIT saves a copy of them in the SinitMleData struct
in the TXT heap (which is DMA protected). So we should read
the DMAR table from that copy if launched by tboot.
Changes to be committed:
modified: xen/arch/x86/tboot.c
modified: xen/drivers/passthrough/vtd/dmar.c
modified: xen/include/asm-x86/tboot.h
Ross Philipson [Wed, 4 Feb 2009 16:11:34 +0000 (11:11 -0500)]
tboot patch 3/5 - protect TXT ranges
tboot no longer marks the TXT heap/SINIT/private config space
as E820_UNUSABLE in the e820 table, so Xen must mark them so
(to disallow them from dom0).
Changes to be committed:
modified: xen/arch/x86/e820.c
modified: xen/arch/x86/setup.c
modified: xen/arch/x86/tboot.c
modified: xen/include/asm-x86/e820.h
modified: xen/include/asm-x86/tboot.h
Ross Philipson [Wed, 4 Feb 2009 15:47:48 +0000 (10:47 -0500)]
Miscellaneous fixes from xen-unstable prior to tboot patch set.
A number of small fixes that were done to address a VT-d fault due
to incorrect memory range checking. Taken from change sets 19061,
19081, and parts of 19083 to 19085.
On branch master
Changes to be committed:
modified: xen/arch/ia64/xen/mm.c
modified: xen/arch/x86/mm.c
modified: xen/arch/x86/setup.c
modified: xen/arch/x86/tboot.c
modified: xen/drivers/passthrough/vtd/iommu.c
modified: xen/drivers/video/vga.c
modified: xen/include/xen/mm.h
Ross Philipson [Tue, 20 Jan 2009 21:36:05 +0000 (16:36 -0500)]
ACPI activation pass-through changes for HVM loader.
This is the first half of the update which processes ACPI pt
information for adding the OEM information and SLIC tables to
allow HVM activation of Vista.
On branch master
Changes to be committed:
modified: tools/firmware/hvmloader/acpi/build.c
modified: tools/firmware/hvmloader/util.c
modified: tools/firmware/hvmloader/util.h
modified: xen/include/public/hvm/hvm_info_table.h
Ross Philipson [Fri, 19 Dec 2008 14:23:59 +0000 (09:23 -0500)]
Adding OEM specific SMBIOS patch files.
Changes to be committed:
new file: oem/dell-960-optiplex-smbios.patch
new file: oem/dell-e6500-latitude-smbios.patch
new file: oem/hp-6930p-elitebook-smbios.patch
new file: oem/lenovo-x200-thinkpad-smbios.patch