search for: shared_pag

Displaying 20 results from an estimated 75 matches for "shared_pag".

Did you mean: shared_page
2011 Sep 08
5
[PATCH 0 of 2] v2: memshare/xenpaging/xen-access fixes for xen-unstable
The following two patches allow the parallel use of memsharing, xenpaging and xen-access by using an independent ring buffer for each feature. Please review. v2: - update mem_event_check_ring arguments, check domain rather than domain_id - check ring_full first because its value was just evaluated - check if ring buffer is initialized before calling mem_access_domctl/mem_paging_domctl
2011 Apr 04
0
[PATCH] linux-2.6.18/backends: use xenbus_be.ko interfaces instead of open-coding them
..._free; - - grant_handle_t shmem_handle; - grant_ref_t shmem_ref; } blkif_t; struct backend_info @@ -111,7 +103,7 @@ struct backend_info blkif_t *blkif_alloc(domid_t domid); void blkif_disconnect(blkif_t *blkif); void blkif_free(blkif_t *blkif); -int blkif_map(blkif_t *blkif, unsigned long shared_page, unsigned int evtchn); +int blkif_map(blkif_t *blkif, grant_ref_t, evtchn_port_t); void vbd_resize(blkif_t *blkif); #define blkif_get(_b) (atomic_inc(&(_b)->refcnt)) --- a/drivers/xen/blkback/interface.c +++ b/drivers/xen/blkback/interface.c @@ -33,7 +33,7 @@ #include "common.h&qu...
2008 Jul 11
1
Question about Using Grant Table
Hi: There is a code sample in <The Definite Guide to the Xen Hypervisor>, chapter 4, "Using Grant Tables". The code sample is as following: #include <public/xen.h> extern void * shared_page; extern grant_entry_t * grant_table; void offer_page() { uint16_t flags; /* create the grant table*/ gnttab_setup_table_t setup_op; setup_op.dom =DOMID_SELF; setup_op.nr_frames = 1; setup_op.frame_list = grant_table; HYPERVISOR_grant_t...
2010 Sep 15
15
xenpaging fixes for kernel and hypervisor
Patrick, there following patches fix xenpaging for me. Granttable handling is incomplete. If a page is gone, a GNTST_eagain should be returned to the caller to inidcate the hypercall has to be retried after a while, until the page is available again. Please review. Olaf _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2007 Jun 07
4
blkif_map error starting fourth guest domain
I''m having problems starting more than three domains. It sometimes works fine, but more often than not the 4th domain''s root block device times out and so the domU kernel panics as there''s no /dev/root: XENBUS: Timeout connecting to device: device/vbd/2057 (state 6) XENBUS: Timeout connecting to device: device/vif/0 (state 6) XENBUS: Timeout connecting to device:
2012 Aug 16
0
[RFC v1 5/5] VBD: enlarge max segment per request in blkfront
...ned int); -extern struct blkback_ring_operation blkback_ring_ops; +extern struct blkback_ring_operation blkback_ring_ops, blkback_ring_ops_v2; struct xenbus_device *xen_blkbk_xenbus(struct backend_info *be) { @@ -176,6 +176,83 @@ static int xen_blkif_map(struct xen_blkif *blkif, unsigned long shared_page, return 0; } +static int +xen_blkif_map_segring(struct xen_blkif *blkif, unsigned long shared_page) +{ + struct blkif_segment_sring *sring; + int err; + + err = xenbus_map_ring_valloc(blkif->be->dev, shared_page, + &blkif->blk_segring); + + if (err < 0) + return err;...
2012 Sep 19
27
[PATCH] Persistent grant maps for xen blk drivers
...unsigned int fsect, lsect; - int i, ref; + int i, ref, use_pers_gnts, new_pers_gnts; grant_ref_t gref_head; + struct bio_vec *bvecs[BLKIF_MAX_SEGMENTS_PER_REQUEST]; + struct bio_vec *bvec; + struct req_iterator iter; + char *bvec_data; + void *shared_data; + unsigned long flags; + struct page *shared_page; + struct gnt_list *gnt_list_entry; struct scatterlist *sg; if (unlikely(info->connected != BLKIF_STATE_CONNECTED)) return 1; - if (gnttab_alloc_grant_references( - BLKIF_MAX_SEGMENTS_PER_REQUEST, &gref_head) < 0) { - gnttab_request_free_callback( - &info->callback,...
2011 Jun 28
5
Memory Page Sharing on Xen 4.0.1
Dear List, I?m trying to figure out *memory page sharing***using HVM on Xen 4.0.1, but I?m not really able to find some useful information or sources about this issue. I just found two links porviding these sources: http://knol.google.com/k/learning-grant-tables http://blog.chinaunix.net/space.php?uid=20286427&do=blog&id=109114 Both are not working.. I think they are made for an older
2012 Oct 04
5
Bug#689646: xen-utils-4.1: fails to create HVM domU
...ot;errno0 = %d\n", errno); + fprintf(logfile, "domid = %d\n", domid); xc_get_hvm_param(xc_handle, domid, HVM_PARAM_IOREQ_PFN, &ioreq_pfn); fprintf(logfile, "shared page at pfn %lx\n", ioreq_pfn); + fprintf(logfile, "errno1 = %d\n", errno); shared_page = xc_map_foreign_range(xc_handle, domid, XC_PAGE_SIZE, PROT_READ|PROT_WRITE, ioreq_pfn); + fprintf(logfile, "errno2 = %d\n", errno); if (shared_page == NULL) { fprintf(logfile, "map shared IO page returned error %d\n", er...
2012 Mar 05
11
[PATCH 0001/001] xen: multi page ring support for block devices
...xen-blkback/xenbus.c index 24a2fb5..7a9d71d 100644 --- a/drivers/block/xen-blkback/xenbus.c +++ b/drivers/block/xen-blkback/xenbus.c @@ -122,8 +122,8 @@ static struct xen_blkif *xen_blkif_alloc(domid_t domid) return blkif; } -static int xen_blkif_map(struct xen_blkif *blkif, unsigned long shared_page, - unsigned int evtchn) +static int xen_blkif_map(struct xen_blkif *blkif, int ring_ref[], + unsigned int ring_order, unsigned int evtchn) { int err; @@ -131,7 +131,8 @@ static int xen_blkif_map(struct xen_blkif *blkif, unsigned long shared_p...
2012 Mar 05
11
[PATCH 0001/001] xen: multi page ring support for block devices
...xen-blkback/xenbus.c index 24a2fb5..7a9d71d 100644 --- a/drivers/block/xen-blkback/xenbus.c +++ b/drivers/block/xen-blkback/xenbus.c @@ -122,8 +122,8 @@ static struct xen_blkif *xen_blkif_alloc(domid_t domid) return blkif; } -static int xen_blkif_map(struct xen_blkif *blkif, unsigned long shared_page, - unsigned int evtchn) +static int xen_blkif_map(struct xen_blkif *blkif, int ring_ref[], + unsigned int ring_order, unsigned int evtchn) { int err; @@ -131,7 +131,8 @@ static int xen_blkif_map(struct xen_blkif *blkif, unsigned long shared_p...
2012 Mar 05
11
[PATCH 0001/001] xen: multi page ring support for block devices
...xen-blkback/xenbus.c index 24a2fb5..7a9d71d 100644 --- a/drivers/block/xen-blkback/xenbus.c +++ b/drivers/block/xen-blkback/xenbus.c @@ -122,8 +122,8 @@ static struct xen_blkif *xen_blkif_alloc(domid_t domid) return blkif; } -static int xen_blkif_map(struct xen_blkif *blkif, unsigned long shared_page, - unsigned int evtchn) +static int xen_blkif_map(struct xen_blkif *blkif, int ring_ref[], + unsigned int ring_order, unsigned int evtchn) { int err; @@ -131,7 +131,8 @@ static int xen_blkif_map(struct xen_blkif *blkif, unsigned long shared_p...
2005 May 24
0
[PATCH] qemu-unregister-c0000.patch
...(isa_bios_size > (128 * 1024)) ===== tools/ioemu/target-i386-dm/helper2.c 1.2 vs edited ===== --- 1.2/tools/ioemu/target-i386-dm/helper2.c 2005-05-20 10:01:22 -07:00 +++ edited/tools/ioemu/target-i386-dm/helper2.c 2005-05-23 16:35:40 -07:00 @@ -313,7 +313,8 @@ intr = &(((vcpu_iodata_t *) shared_page)->vp_intr[0]); atomic_set_bit(vector, intr); - fprintf(logfile, "injecting vector: %x\n", vector); + if (loglevel & CPU_LOG_INT) + fprintf(logfile, "injecting vector: %x\n", vector); env->send_event = 1; } _________________________...
2006 Aug 23
18
Some issues in recent ChangeSet.
We saw these issues in recent ChangeSet: 1. Reboot fail in Guest OS: Reboot in guest will close current qemu windows but does not create a new qemu window to restart 32bit HV/xen0: 2. 4 LTP math cases(float_bessel, float_exp_log, float_power and float_trigo) sometime fail. (775) 3. Kernel build in VMX may meet kernel panic. It complains like: "<0> Kernel panic - not syncing:
2005 Aug 31
0
[PATCH] Re: SMP dom0 with 8 cpus of i386
...other CPUs are getting the interrupts (timer) at the same time, interrupts handlers access the shared_info page to notify the dom0 of the events such as timer event. The problem possibly is that because of the writable page tables, the L1 page is getting evicted during the mmconfig access, and the shared_page translation needed for event notification is also in the same L1 page. All the cpus are using the same page tables at this time. While writing the pte, the L2 page is getting cut off from the page table. This is somehow causing corruption in the dom0 page tables, and we see the errors. I beliv...
2005 Sep 01
0
RE: [PATCH] Re: SMP dom0 with 8 cpus of i386
...terrupts (timer) > at the same time, interrupts handlers access the shared_info > page to notify the dom0 of the events such as timer event. > The problem possibly is that because of the writable page > tables, the L1 page is getting evicted during the mmconfig > access, and the shared_page translation needed for event > notification is also in the same L1 page. All the cpus are > using the same page tables at this time. While writing the pte, the > L2 page is getting cut off from the page table. This is > somehow causing corruption in the dom0 page tables, and we &gt...
2010 Aug 12
59
[PATCH 00/15] RFC xen device model support
Hi all, this is the long awaited patch series to add xen device model support in qemu; the main author is Anthony Perard. Developing this series we tried to come up with the cleanest possible solution from the qemu point of view, limiting the amount of changes to common code as much as possible. The end result still requires a couple of hooks in piix_pci but overall the impact should be very
2012 Jan 05
3
[PATCH 0 of 2] xenpaging:speed up page-in
The following two patches are about how to speed up in xenpaging when page in pages. On suse11-64 with 4G memory,if we page out 2G pages,it will cost about 15.5 seconds, but take 2088 seconds to finish paging in.If page-in costs too much time,it will cause unmesurable problems when vm or dom0 access the paged_out page,such as BSOD,crash. What鈥檚 more,the dom0 is always in high I/O pressure.
2011 Nov 29
10
[PATCH 0 of 2] Fix correctness race in xc_mem_paging_prep
ging_prep ensures that an mfn is backing the paged-out gfn, and transitions to the next state in the paging state machine for this page. Foreign mappings of the gfn will now succeed. This is the key idea, as it allows the pager to now map the gfn and fill in its contents. Unfortunately, it also allows any other foreign mapper to map the gfn and read its contents. This is particularly dangerous
2008 Jun 19
0
[PATCH] ia64/xen: introduce definitions necessary for ia64/xen hypercalls.
.../* Arch specific VIRQs definition */ +#define VIRQ_ITC VIRQ_ARCH_0 /* V. Virtual itc timer */ +#define VIRQ_MCA_CMC VIRQ_ARCH_1 /* MCA cmc interrupt */ +#define VIRQ_MCA_CPE VIRQ_ARCH_2 /* MCA cpe interrupt */ + +/* Maximum number of virtual CPUs in multi-processor guests. */ +/* keep sizeof(struct shared_page) <= PAGE_SIZE. + * this is checked in arch/ia64/xen/hypervisor.c. */ +#define MAX_VIRT_CPUS 64 + +#ifndef __ASSEMBLY__ + +#define INVALID_MFN (~0UL) + +union vac { + unsigned long value; + struct { + int a_int:1; + int a_from_int_cr:1; + int a_to_int_cr:1; + int a_from_psr:1; + int a_from_...