search for: handle_mmio

Displaying 20 results from an estimated 22 matches for "handle_mmio".

Did you mean: handle_ioio
2005 Jun 30
0
[PATCH][2/10] Extend the VMX intercept mechanism to include mmio as well as portio.
...om> Signed-off-by: Arun Sharma <arun.sharma@intel.com> diff -r febfcd0a1a0a -r 9a43d5c12b95 xen/include/asm-x86/vmx_platform.h --- a/xen/include/asm-x86/vmx_platform.h Thu Jun 30 03:20:48 2005 +++ b/xen/include/asm-x86/vmx_platform.h Thu Jun 30 04:08:50 2005 @@ -88,6 +88,7 @@ extern void handle_mmio(unsigned long, unsigned long); extern void vmx_wait_io(void); extern int vmx_setup_platform(struct vcpu *, struct cpu_user_regs *); +extern void vmx_io_assist(struct vcpu *v); // XXX - think about this -- maybe use bit 30 of the mfn to signify an MMIO frame. #define mmio_space(gpa) (!VALID_MF...
2008 Mar 17
12
[PATCH]Fix the bug of guest os installation failure and win2k boot failure
Hi, Keir, This patch is to fix the problem of Linux guest installation failure and Windows 2000 boot failure.       In the early code, we use vmx_vmexit_handler() -> vmx_io_instruction() function to emulate I/O instructions. But now, we use vmx_vmexit_handler() -> handle_mmio -> hvm_emulate_one() -> x86_emulate() to emulate I/O instructions. Also nowadays, the realmode emulation code walks through the path: vmx_realmode() -> realmode_emulate_one() -> hvm_emulate_one() -> x86_emulate().       The I/O handle code in x86_emulate() checks the cpl and iopl va...
2012 Feb 15
2
HYBRID: memory mapped IO
...ttributes. I''m trying to figure how to do this for PV in HVM container. I was hoping to update the EPT directly. I was thinking of just doing guest_physmap_add_entry() but the mfn is not going to be valid. Is there any other code path that will let me do this? Another possiblity would be handle_mmio(). thanks, Mukesh
2006 Jul 14
4
VMX status report 10680:f692a0a476c5
We have tested the latest xen on VT platform with Intel 915/E8500 chipset. Here is the test summary: Issues: - Cannot boot Four VMX at same time on IA32 host - Cannot boot Windows XP SP1/SP2 on IA32e host - Create IA32-PAE VMX on IA32e host will make VMX kernel panic - Create IA32 VMX on IA32e host will make VMX hang - Destroying VMX with 4G memory may make xend hang on IA-32e IA-32: -
2005 Apr 02
1
[PATCH] VMX support for MMIO/PIO in VM8086 mode
...coder_regs->cs, inst_decoder_regs->eip, p->dir, p->pdata_valid); + printf("port_mm %d, size %lld, addr 0x%llx, value 0x%lx, count %lld\n", + p->port_mm, p->size, p->addr, value, p->count); +#endif evtchn_send(IOPACKET_PORT); do_block(); - } void handle_mmio(unsigned long va, unsigned long gpa) { - unsigned long eip; - unsigned long inst_len; + unsigned long eip, eflags, cs; + unsigned long inst_len, inst_addr; struct mi_per_cpu_info *mpci_p; struct xen_regs *inst_decoder_regs; struct instruction mmio_inst; unsigned cha...
2010 Mar 05
3
[PATCH] x86/hvm: accelerate IO intercept handling
...the times, as both VMX and SVM provide all the necessary information already in the VMCS/VMCB. String instructions are not covered by this shortcut, but they are quite rare and we would need to access the guest memory anyway. This patch decodes the information from VMCB/VMCS and calls a simple handle_mmio wrapper. In handle_mmio() itself the emulation part will simply be skipped, this approach avoids code duplication. Since the vendor specific part is quite trivial, I implemented both the VMX and SVM part, please check the VMX part for sanity. I simply boot tested both versions and ran some simpl...
2012 May 24
11
[PATCH 0/3] XEN: fix vmx exception mistake
This series of patches fix the mistake for debug exception(#DB), overflow exception(#OF) and INT3(#BP), INTn instruction emulation. Introduce new function vmx_inject_sw_exception() which deliver the software excetion, software interrupt and privileged software exception. Split hardware exception as a seperate function(old function vmx_inject_hw_exception()). Also Passed down intruction length
2012 May 30
12
[PATCH v2 0/4] XEN: fix vmx exception mistake
Changes from v1: - Define new struct hvm_trap to represent information of trap, include instruction length. - Renames hvm_inject_exception to hvm_inject_trap. Then define a couple of wrappers around that function for existing callers, so that their parameter lists actually *shrink*. This series of patches fix the mistake for debug exception(#DB), overflow exception(#OF) and INT3(#BP),
2008 Jun 06
4
Query regarding x86_emulate_memop() function
Hi there, I have a question regarding the functionality of x86_emulate_memop (Xen 3.1) or x86_emulate (Xen 3.2) function. This function gets called from sh_page_fault() function which is invoked when Xen receives a page fault. Since I am not clear completely about the emulation operation performed by Xen, I have following questions with a below mentioned scenario? 1) Suppose I have a memory
2020 Feb 11
0
[PATCH 41/62] x86/sev-es: Handle MSR events
...e kernel * switched to virtual addresses. @@ -196,6 +225,9 @@ static enum es_result handle_vc_exception(struct es_em_ctxt *ctxt, case SVM_EXIT_IOIO: result = handle_ioio(ghcb, ctxt); break; + case SVM_EXIT_MSR: + result = handle_msr(ghcb, ctxt); + break; case SVM_EXIT_NPF: result = handle_mmio(ghcb, ctxt); break; -- 2.17.1
2005 Nov 03
0
[PATCH] vmx-platform-vmread.patch
...vtchn_send(int lport); @@ -649,8 +643,6 @@ } p = &vio->vp_ioreq; - - vm86 = regs->eflags & X86_EFLAGS_VM; if (test_bit(ARCH_VMX_IO_WAIT, &v->arch.arch_vmx.flags)) { printf("VMX I/O has not yet completed\n"); @@ -725,7 +717,6 @@ void handle_mmio(unsigned long va, unsigned long gpa) { - unsigned long eip, eflags, cs; unsigned long inst_len, inst_addr; struct mmio_op *mmio_opp; struct cpu_user_regs *regs; @@ -734,18 +725,17 @@ int i, vm86, ret; mmio_opp = &current->arch.arch_vmx.mmio_op; + regs = mm...
2006 May 17
1
RE: RE: [Xen-changelog] Fix MOVS instruction emulation for HVM MMIO.
...HVM MMIO. > >> > >> diff -r aab3cd33d2ba -r 7fdc4a8b782b xen/arch/x86/hvm/platform.c > >> --- a/xen/arch/x86/hvm/platform.c Tue May 16 16:34:27 2006 +0100 > >> +++ b/xen/arch/x86/hvm/platform.c Tue May 16 19:50:23 2006 +0100 > >> @@ -865,7 +865,7 @@ void handle_mmio(unsigned long va, unsig > >> * copy ourself. After this copy succeeds, "rep movs" is > >> executed > >> * again. > >> */ > >> - if ((addr & PAGE_MASK) != ((addr + size - 1) & > PAGE_MASK)) { &gt...
2006 Jul 18
33
Paravirtualised drivers for fully virtualised domains
(The list appears to have eaten my previous attempt to send this. Apologies if you receive multiple copies.) The attached patches allow you to use paravirtualised network and block interfaces from fully virtualised domains, based on Intel''s patches from a few months ago. These are significantly faster than the equivalent ioemu devices, sometimes by more than an order of magnitude.
2006 Jul 26
5
[Fwd: stack overflow "cause" found]
...map_p2m_entry: 408 0xffff830000170398 map_p2m_entry: 408 0xffff830000169fb9 l2e_rw_fault: 400 0xffff83000017d0c0 l2e_rw_fault: 400 0xffff830000188881 l2e_rw_fault: 400 0xffff830000196219 handle_mmio: 400 0xffff8300001356d4 load_segments: 384 0xffff8300001b9363 show_registers: 384 0xffff8300001b9a60 show_registers: 384 0xffff830000116079 do_multicall: 376 0xffff8300001166bb do_multical...
2020 Feb 11
83
[RFC PATCH 00/62] Linux as SEV-ES Guest Support
Hi, here is the first public post of the patch-set to enable Linux to run under SEV-ES enabled hypervisors. The code is mostly feature-complete, but there are still a couple of bugs to fix. Nevertheless, given the size of the patch-set, I think it is about time to ask for initial feedback of the changes that come with it. To better understand the code here is a quick explanation of SEV-ES first.
2020 Feb 11
83
[RFC PATCH 00/62] Linux as SEV-ES Guest Support
Hi, here is the first public post of the patch-set to enable Linux to run under SEV-ES enabled hypervisors. The code is mostly feature-complete, but there are still a couple of bugs to fix. Nevertheless, given the size of the patch-set, I think it is about time to ask for initial feedback of the changes that come with it. To better understand the code here is a quick explanation of SEV-ES first.
2013 Sep 23
57
[PATCH RFC v13 00/20] Introduce PVH domU support
This patch series is a reworking of a series developed by Mukesh Rathor at Oracle. The entirety of the design and development was done by him; I have only reworked, reorganized, and simplified things in a way that I think makes more sense. The vast majority of the credit for this effort therefore goes to him. This version is labelled v13 because it is based on his most recent series, v11.
2011 Nov 08
48
Need help with fixing the Xen waitqueue feature
The patch ''mem_event: use wait queue when ring is full'' I just sent out makes use of the waitqueue feature. There are two issues I get with the change applied: I think I got the logic right, and in my testing vcpu->pause_count drops to zero in p2m_mem_paging_resume(). But for some reason the vcpu does not make progress after the first wakeup. In my debugging there is one
2012 Jan 09
39
[PATCH v4 00/25] xen: ARMv7 with virtualization extensions
Hello everyone, this is the fourth version of the patch series that introduces ARMv7 with virtualization extensions support in Xen. The series allows Xen and Dom0 to boot on a Cortex-A15 based Versatile Express simulator. See the following announce email for more informations about what we are trying to achieve, as well as the original git history: See
2006 Jul 14
23
[RFC] New shadow paging code
We (Michael Fetterman, George Dunlap and I) have been working over the last while on a full replacement for Xen''s shadow pagetable support. This mail contains some design notes, below; a patch against xen-unstable, giving a snapshot of the current state of the new shadow code, is at http://www.cl.cam.ac.uk/~tjd21/shadow2.patch Comments on both are welcome, although the code is not