similar to: [PATCH, v2] qemu/xendisk: properly update stats in ioreq_release()

Displaying 15 results from an estimated 15 matches similar to: "[PATCH, v2] qemu/xendisk: properly update stats in ioreq_release()"

2012 May 14
0
Re: [Qemu-devel] [PATCH, v2] qemu/xendisk: properly update stats in ioreq_release()
Am 14.05.2012 12:30, schrieb Jan Beulich: > While for the "normal" case (called from blk_send_response_all()) > decrementing requests_finished is correct, doing so in the parse error > case is wrong; requests_inflight needs to be decremented instead. > > Change in v2: Adjust coding style. > > Signed-off-by: Jan Beulich <jbeulich@suse.com> I think it would be
2010 Nov 09
0
[PATCH] ia64: fix the build (again)
Signed-off-by: Jan Beulich <jbeulich@novell.com> --- a/xen/drivers/passthrough/vtd/ia64/vtd.c +++ b/xen/drivers/passthrough/vtd/ia64/vtd.c @@ -27,6 +27,7 @@ #include <asm/sal.h> #include "../iommu.h" #include "../dmar.h" +#include "../extern.h" #include "../vtd.h" --- a/xen/drivers/passthrough/vtd/quirks.c +++
2006 Oct 23
1
[PATCH] Move ACPI timer to HV
Keir, The patch moves ACPI timer to HV, which is the last platform timer in Qemu. We found Vista polls ACPI timer very frequently (about 15 times averagely) when handling timer (RTC @ 64HZ) interrupt routine. Though the exact reason is known, it should be related to system time adjustment. When it''s in Qemu, the overhead is big. After moving, Vista''s idle overhead decreases
2012 May 08
0
Re: ioreq pages in vm memory and ioreq demux
At 09:49 +0100 on 08 May (1336470591), Tim Deegan wrote: > Ccing xen-devel. Actually this time. > At 11:29 -0700 on 07 May (1336390171), Christian Limpach wrote: > > > The current version of Xen allocates the shared page directly > > > in vm memory with other pages (like XenStore page) called > > > special pages. I just begin to hack Xen, so I used the same >
2008 May 16
0
[PATCH][HVM] stdvga: handle 64bit io operations
Hi! In struct ioreq are the "addr", "size", "count" and "data" 64bit fields. So handle 64bit operations in stdvga instead of throwing away the upper 32bits (see attached patch). This fixes some noisy xen messages like "invalid io size: 8". Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> -- AMD Saxony, Dresden, Germany
2009 Mar 02
0
ioemu: make various functions in i386-dm/helper2.c static
These functions don''t seem to be used outside of i386-dm/helper2.c Signed-off-by: Simon Horman <horms@verge.net.au> --- i386-dm/helper2.c | 23 ++++++++++++----------- 1 file changed, 12 insertions(+), 11 deletions(-) Index: ioemu-remote/i386-dm/helper2.c =================================================================== --- ioemu-remote.orig/i386-dm/helper2.c 2009-03-02
2006 Apr 30
0
xm create: INIT: cannot execute "/etc/init.d/boot"
Hi, I''m trying to run Xen 3.0 with a file-backed VBD on a opteron system. Here''s my Xen config file (xenconf): # -*- mode: python; -*- kernel = "/boot/vmlinuz-xen" ramdisk = "/boot/initrd-xen" memory = 1024 name = "Dom2" vif = [ '''' ] disk = [ ''file:/xendisk/vm3disk,sda1,w'' ] root = "/dev/sda1
2005 Feb 11
7
fdisk hard drive image
Hello list, Currently, i use a partition image to run my XenU (/dev/hda2) and "fdisk -l" return nothing and can''t open /dev/hda . I want to use a full hard drive image (not partition image) from my Xen0 as hda in my XenU. I want to be able to run fdisk on hda in my XenU to list and regenerate partitions. I tried with this (/img is my hard drive image): disk =
2012 Aug 23
2
[PATCH] nvmx: fix resource relinquish for nested VMX
The previous order of relinquish resource is: relinquish_domain_resources() -> vcpu_destroy() -> nvmx_vcpu_destroy(). However some L1 resources like nv_vvmcx and io_bitmaps are free in nvmx_vcpu_destroy(), therefore the relinquish_domain_resources() will not reduce the refcnt of the domain to 0, therefore the latter vcpu release functions will not be called. To fix this issue, we need to
2013 Dec 04
5
qemu-xen-dir + PCI passthrough = BOOM
Hey, I just started noticing it today - with qemu-xen (tip is commit b97307ecaad98360f41ea36cd9674ef810c4f8cf xen_disk: mark ioreq as mapped before unmapping in error case) when I try to pass in a PCI device at bootup it blows up with: char device redirected to /dev/pts/2 (label serial0) qemu: hardware error: xen: failed to populate ram at 40050000 CPU #0: EAX=00000000 EBX=00000000
2012 Oct 24
5
[PATCH v3] IOMMU: keep disabled until iommu_setup() is called
The iommu is enabled by default when xen is booting and later disabled in iommu_setup() when no iommu is present. But under some circumstances iommu code can be called before iommu_setup() is processed. If there is no iommu available xen crashes. This can happen for example when panic(...) is called as introduced with the patch "x86-64: detect processors subject to AMD erratum #121 and
2006 Jun 21
15
[PATCH] patch to buffer write ioreq
This patch implements a new mechanism to buffer the MMIO_WRITE and PIO_WRITE packet in a queue, and then submit them to qemu-dm in batch. This could save a lot of domain switch time. We implement this as a generic one to do ioreq in batch. However, we only use it to batch the MMIO_WIRTE request for stdvga(0xA0000-0xC0000) in order to solve the win2k boot issue for hvm domain. Without this patch,
2010 Jul 02
1
Woohoo! Windows Server 2008 RC2 on Xen 4.0
Surely you hear plenty about what''s not working, so I thought I''d shoot a quick message on something that did work. I got Windows Server 2008 RC2 installed. I have yet to even activate it and prove all internal features/devices work, but installation alone satisfied me! I had to fight a couple issues and I''ll mention them here, i think they''d be pretty
2007 Jan 11
0
[PATCH 6/8] HVM save restore: guest memory handling
[PATCH 6/8] HVM save restore: guest memory handling Signed-off-by: Zhai Edwin <edwin.zhai@intel.com> add support for save/restore HVM guest memory diff -r bb1c450b2739 tools/libxc/xc_hvm_restore.c --- a/tools/libxc/xc_hvm_restore.c Thu Jan 11 21:03:11 2007 +0800 +++ b/tools/libxc/xc_hvm_restore.c Thu Jan 11 21:05:45 2007 +0800 @@ -31,6 +31,40 @@ #include <xen/hvm/ioreq.h>
2007 Nov 29
6
PCI Passthrough to HVM on xen-unstable
I am working on S5000VSA Intel Server Board with the following cpu spec. XEN-PEER-RHEL5 $ cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 15 model name : Intel(R) Xeon(R) CPU E5345 @ 2.33GHz stepping : 7 cpu MHz : 2327.512 cache size : 4096 KB physical id : 0 siblings : 1 core id : 0