search for: ioreq

Displaying 20 results from an estimated 26 matches for "ioreq".

Did you mean: ifreq
2012 May 14
1
[PATCH, v2] qemu/xendisk: properly update stats in ioreq_release()
...decrementing requests_finished is correct, doing so in the parse error case is wrong; requests_inflight needs to be decremented instead. Change in v2: Adjust coding style. Signed-off-by: Jan Beulich <jbeulich@suse.com> --- a/hw/xen_disk.c +++ b/hw/xen_disk.c @@ -154,7 +154,7 @@ static void ioreq_finish(struct ioreq *i blkdev->requests_finished++; } -static void ioreq_release(struct ioreq *ioreq) +static void ioreq_release(struct ioreq *ioreq, bool finish) { struct XenBlkDev *blkdev = ioreq->blkdev; @@ -162,7 +162,11 @@ static void ioreq_release(struct ioreq * mem...
2012 May 08
0
Re: ioreq pages in vm memory and ioreq demux
...en allocates the shared page directly > > > in vm memory with other pages (like XenStore page) called > > > special pages. I just begin to hack Xen, so I used the same > > > technique. If you have another idea I''m interested. > > > > Yes, I think the ioreq pages should be allocated from the xen heap. > > As far as I can tell, they don''t need to be guest accessible. Your > > approach is fine, but since we''re making the number of pages dynamic, > > now might be a good time to change this. > > > > I was...
2012 Feb 25
9
[xen-unstable bisection] complete test-amd64-i386-rhel6hvm-amd
branch xen-unstable xen branch xen-unstable job test-amd64-i386-rhel6hvm-amd test redhat-install Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/jeremy/xen.git Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git Tree: xen http://xenbits.xen.org/staging/xen-unstable.hg *** Found and reproduced problem
2012 Nov 12
10
Hypervisor to dom0 communication
Hello, I''m interested in establishing a communication channel between the Xen hypervisor and a dom0 userspace application. Ideally this would be a 2-way channel, with the hypervisor asynchronously notifying this application, and then (for certain types of messages) wait for a reply from the userspace consumer. To this end, I''ve been reading xen-devel posts [1], read the
2006 Jun 21
15
[PATCH] patch to buffer write ioreq
This patch implements a new mechanism to buffer the MMIO_WRITE and PIO_WRITE packet in a queue, and then submit them to qemu-dm in batch. This could save a lot of domain switch time. We implement this as a generic one to do ioreq in batch. However, we only use it to batch the MMIO_WIRTE request for stdvga(0xA0000-0xC0000) in order to solve the win2k boot issue for hvm domain. Without this patch, win2k cannot boot up on HVM domain. Signed-off-by: Zhu Han <zhu.han@intel.com> Signed-off-by: Eddie Dong <eddie.dong@in...
2010 Aug 12
59
[PATCH 00/15] RFC xen device model support
Hi all, this is the long awaited patch series to add xen device model support in qemu; the main author is Anthony Perard. Developing this series we tried to come up with the cleanest possible solution from the qemu point of view, limiting the amount of changes to common code as much as possible. The end result still requires a couple of hooks in piix_pci but overall the impact should be very
2013 Dec 04
5
qemu-xen-dir + PCI passthrough = BOOM
Hey, I just started noticing it today - with qemu-xen (tip is commit b97307ecaad98360f41ea36cd9674ef810c4f8cf xen_disk: mark ioreq as mapped before unmapping in error case) when I try to pass in a PCI device at bootup it blows up with: char device redirected to /dev/pts/2 (label serial0) qemu: hardware error: xen: failed to populate ram at 40050000 CPU #0: EAX=00000000 EBX=00000000 ECX=00000000 EDX=00000633 ESI=00000000 EDI=...
2006 Oct 23
1
[PATCH] Move ACPI timer to HV
...latform timer in HV, which results in Vista complains "can''t measure TSC frequency". This patch changes vpit.h to vpt.h, for it not only has pit structure in it, but other platform timer''s structure. Another change is moving ACPI timer and related address from acpi.h to ioreq.h, which can be shared by HV and ACPI firmware. What do you think of it? Signed-off-by: Xiaowei Yang <xiaowei.yang@intel.com> Thanks, Xiaowei _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2013 May 08
11
[PATCH 1/2] xen, libxc: init msix addr/data with value from qemu via hypercall
Accelerated msix entry is initialized to zero when msixtbl_pt_register is called. This doesn''t match the value from qemu side, although pirq may already be mapped and binded in qemu side. Kernel will get wrong value when reading msix info. Signed-off-by: Zhenzhong Duan <zhenzhong.duan@oracle.com> Tested-by: Yuval Shaia <yuval.shaia@oracle.com> --- tools/libxc/xc_domain.c
2012 Jan 12
4
[PATCH] qemu-dm: add command to flush buffer cache
Add support for a xenstore dm command to flush qemu''s buffer cache. qemu will just keep mapping pages and not release them, which causes problems for the memory pager (since the page is mapped, it won''t get paged out). When the pager has trouble finding a page to page out, it asks qemu to flush its buffer, which releases all the page mappings. This makes it possible to find
2006 Aug 08
11
architecture-specific stuff in xend
Hi Ewan, I''m almost ready to integrate some PPC-specific stuff into xend, and I was wondering if you had a plan for how that should work. First example: the device tree data structure we talked about a few weeks ago. We will need to pass the config data to PPC code, probably in XendDomainInfo.initDomain(), and then pass the resulting data structure into libxc''s xc_linux_load()
2007 Mar 24
5
memsize for HVM save/restore
As you know, HVM save/restore broke recently because restored config miss guest memsize that used by xc_hvm_restore to locate some pfn. After discussion, we decided to remove the pfn deduction logic from restore side by adding a general memory layout. I have a patch for it. But then qemu broke, because it also require the memsize to locate the share page. We can''t use the previous
2006 May 17
20
X86_emulate to be moved into qemu...
> Hmmm... wouldn''t it be nice if we didn''t have a bespoke, > buggy & incomplete emulator for hvm mmio. ;-) In the process of solving this one, I''ve got to (another) of the blocking points... At the moment, we translate the virtual address from the guest in the page-fault-handler to guest physical address via the gva_to_gpa() function in svm.c/vmx.c:
2012 Oct 24
5
[PATCH v3] IOMMU: keep disabled until iommu_setup() is called
...el_vtd_setup(void) int ret; if ( list_empty(&acpi_drhd_units) ) - return -ENODEV; + { + ret = -ENODEV; + goto error; + } platform_quirks_init(); --- a/xen/include/xen/iommu.h +++ b/xen/include/xen/iommu.h @@ -26,7 +26,7 @@ #include <public/hvm/ioreq.h> #include <public/domctl.h> -extern bool_t iommu_enabled; +extern bool_t iommu_enable, iommu_enabled; extern bool_t force_iommu, iommu_verbose; extern bool_t iommu_workaround_bios_bug, iommu_passthrough; extern bool_t iommu_snoop, iommu_qinval, iommu_intremap; _________________...
2007 Apr 13
18
A different probklem with save/restore on C/S 14823.
I''m not seeing the problem that Fan Zhao is reporting, instead I get this one. Not sure if ti''s the same one or a different problem... This happens with my simple-guest [i.e. not using hvmloader, as I described before]. This worked fine yesterday. (XEN) event_channel.c:178:d0 EVTCHNOP failure: domain 0, error -22, line 178 (XEN) bad shared page: 0 (XEN) domain_crash_sync called
2008 May 16
0
[PATCH][HVM] stdvga: handle 64bit io operations
Hi! In struct ioreq are the "addr", "size", "count" and "data" 64bit fields. So handle 64bit operations in stdvga instead of throwing away the upper 32bits (see attached patch). This fixes some noisy xen messages like "invalid io size: 8". Signed-off-by: Christoph...
2010 Nov 09
0
[PATCH] ia64: fix the build (again)
...*)fix_to_virt(FIX_IGD_MMIO); +#else + igd_reg_va = ioremap_nocache(igd_reg, 0x100); +#endif } /* --- a/xen/include/asm-ia64/hvm/vacpi.h +++ b/xen/include/asm-ia64/hvm/vacpi.h @@ -24,10 +24,6 @@ #include <public/arch-ia64/hvm/save.h> /* for struct vacpi_regs */ #include <public/hvm/ioreq.h> -#define ACPI_PM1A_EVT_BLK_ADDRESS 0x0000000000001f40 -#define ACPI_PM1A_CNT_BLK_ADDRESS (ACPI_PM1A_EVT_BLK_ADDRESS + 0x04) -#define ACPI_PM_TMR_BLK_ADDRESS (ACPI_PM1A_EVT_BLK_ADDRESS + 0x08) - #define IS_ACPI_ADDR(X) ((unsigned long)((X)-ACPI_PM1A_EVT_BLK_ADDRESS)<12) #define FRE...
2012 May 14
0
Re: [Qemu-devel] [PATCH, v2] qemu/xendisk: properly update stats in ioreq_release()
...()) > decrementing requests_finished is correct, doing so in the parse error > case is wrong; requests_inflight needs to be decremented instead. > > Change in v2: Adjust coding style. > > Signed-off-by: Jan Beulich <jbeulich@suse.com> I think it would be nicer if a struct ioreq had an explicit state so that you don''t have to pass the right state when releasing it. But anyway, the patch looks correct to me: Reviewed-by: Kevin Wolf <kwolf@redhat.com>
2009 Mar 02
0
ioemu: make various functions in i386-dm/helper2.c static
...te.orig/i386-dm/helper2.c 2009-03-02 15:18:05.000000000 +1100 +++ ioemu-remote/i386-dm/helper2.c 2009-03-02 15:18:33.000000000 +1100 @@ -211,7 +211,7 @@ target_phys_addr_t cpu_get_phys_page_deb } //some functions to handle the io req packet -void sp_info(void) +static void sp_info(void) { ioreq_t *req; int i; @@ -281,7 +281,8 @@ static ioreq_t *cpu_get_ioreq(void) return NULL; } -unsigned long do_inp(CPUState *env, unsigned long addr, unsigned long size) +static unsigned long do_inp(CPUState *env, unsigned long addr, + unsigned long size) { sw...
2012 Aug 23
2
[PATCH] nvmx: fix resource relinquish for nested VMX
...h/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -561,6 +561,9 @@ int hvm_domain_initialise(struct domain *d) void hvm_domain_relinquish_resources(struct domain *d) { + if ( hvm_funcs.nhvm_domain_relinquish_resources ) + hvm_funcs.nhvm_domain_relinquish_resources(d); + hvm_destroy_ioreq_page(d, &d->arch.hvm_domain.ioreq); hvm_destroy_ioreq_page(d, &d->arch.hvm_domain.buf_ioreq); diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c index ffb86c1..3ea7012 100644 --- a/xen/arch/x86/hvm/vmx/vmx.c +++ b/xen/arch/x86/hvm/vmx/vmx.c @@ -1547,7 +1547,8...