[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH][1/10] Device model cleanup.
Device model cleanup. - Single config file for xen and device models (Shell script doesn't source xmdefconfig anymore) - No more device-model shell script by default. You can have one if needed (qemu-dm.debug) - All logic in the script device-model is moved to python - $DISPLAY is passed from xm to xend - Don't fork vncviewer on dryruns - Add support for killing device models on domain destroy - info vmxiopage command added to the monitor - Refactor shared io page into global and per vcpu state - Remove the hard coding of IOPACKET_PORT - move the virtual_platform_def up to domain struct from vcpu - xm create -n: (vm (name ExampleVMXDomain) (memory 128) (ssidref -1) (image (vmx (kernel /usr/lib/xen/boot/vmxloader) (root '/dev/hda1 ro') (vcpus 1) ) ) (memmap ) (device_model /tmp/foo) (hda /var/images/min-el3-i386.img) (hdb ) (hdc ) (hdd ) (cdrom ) (boot c) (fda ) (fdb ) (localtime 0) (serial ) (macaddr ) (stdvga 0) (isa 0) (nographic 0) (vnc 0) (sdl 0) (display localhost:10.0) ) Signed-off-by: Edwin Zhai <edwin.zhai@xxxxxxxxx> Signed-off-by: Arun Sharma <arun.sharma@xxxxxxxxx> diff -r 23833ae55425 -r febfcd0a1a0a xen/include/asm-x86/domain.h --- a/xen/include/asm-x86/domain.h Tue Jun 28 16:38:30 2005 +++ b/xen/include/asm-x86/domain.h Thu Jun 30 03:20:48 2005 @@ -63,7 +63,7 @@ struct list_head free_shadow_frames; pagetable_t phys_table; /* guest 1:1 pagetable */ - + struct virtual_platform_def vmx_platform; } __cacheline_aligned; struct arch_vcpu diff -r 23833ae55425 -r febfcd0a1a0a tools/ioemu/target-i386-dm/helper2.c --- a/tools/ioemu/target-i386-dm/helper2.c Tue Jun 28 16:38:30 2005 +++ b/tools/ioemu/target-i386-dm/helper2.c Thu Jun 30 03:20:48 2005 @@ -45,14 +45,16 @@ #include <limits.h> #include <fcntl.h> +#include <sys/ioctl.h> #include "xc.h" #include <io/ioreq.h> #include "cpu.h" #include "exec-all.h" - -void *shared_page; +#include "vl.h" + +shared_iopage_t *shared_page = NULL; CPUX86State *cpu_86_init(void) { @@ -116,19 +118,27 @@ //the evtchn port for polling the notification, should be inputed as bochs's parameter u16 ioreq_port = 0; -void *shared_page = NULL; - //some functions to handle the io req packet +void +sp_info() +{ + ioreq_t *req; + + req = &(shared_page->vcpu_iodata[0].vp_ioreq); + term_printf("event port: %d\n", shared_page->sp_global.eport); + term_printf("req state: %x, pvalid: %x, addr: %llx, data: %llx, count: %llx, size: %llx\n", req->state, req->pdata_valid, req->addr, req->u.data, req->count, req->size); +} //get the ioreq packets from share mem ioreq_t* __cpu_get_ioreq(void) { ioreq_t *req; - req = &((vcpu_iodata_t *) shared_page)->vp_ioreq; + + req = &(shared_page->vcpu_iodata[0].vp_ioreq); if (req->state == STATE_IOREQ_READY) { req->state = STATE_IOREQ_INPROCESS; } else { - fprintf(logfile, "False I/O requrest ... in-service already: %x, pvalid: %x,port: %llx, data: %llx, count: %llx, size: %llx\n", req->state, req->pdata_valid, req->addr, req->u.data, req->count, req->size); + fprintf(logfile, "False I/O request ... in-service already: %x, pvalid: %x,port: %llx, data: %llx, count: %llx, size: %llx\n", req->state, req->pdata_valid, req->addr, req->u.data, req->count, req->size); req = NULL; } @@ -310,8 +320,7 @@ // Send a message on the event channel. Add the vector to the shared mem // page. - - intr = &(((vcpu_iodata_t *) shared_page)->vp_intr[0]); + intr = &(shared_page->vcpu_iodata[0].vp_intr[0]); atomic_set_bit(vector, intr); if (loglevel & CPU_LOG_INT) fprintf(logfile, "injecting vector: %x\n", vector); diff -r 23833ae55425 -r febfcd0a1a0a tools/python/xen/xm/create.py --- a/tools/python/xen/xm/create.py Tue Jun 28 16:38:30 2005 +++ b/tools/python/xen/xm/create.py Thu Jun 30 03:20:48 2005 @@ -254,9 +254,69 @@ fn=set_value, default='', use="Path to device model program.") -gopts.var('device_config', val='FILE', - fn=set_value, default='', - use="Path to device model configuration.") +gopts.var('hda', val='FILE', + fn=set_value, default='', + use="Path to hda") + +gopts.var('hdb', val='FILE', + fn=set_value, default='', + use="Path to hdb") + +gopts.var('hdc', val='FILE', + fn=set_value, default='', + use="Path to hdc") + +gopts.var('hdd', val='FILE', + fn=set_value, default='', + use="Path to hdd") + +gopts.var('fda', val='FILE', + fn=set_value, default='', + use="Path to fda") + +gopts.var('fdb', val='FILE', + fn=set_value, default='', + use="Path to fdb") + +gopts.var('serial', val='FILE', + fn=set_value, default='', + use="Path to serial or pty or vc") + +gopts.var('localtime', val='no|yes', + fn=set_bool, default=0, + use="Is RTC set to localtime?") + +gopts.var('stdvga', val='no|yes', + fn=set_bool, default=0, + use="Use std vga or cirrhus logic graphics") + +gopts.var('isa', val='no|yes', + fn=set_bool, default=0, + use="Simulate an ISA only system?") + +gopts.var('cdrom', val='FILE', + fn=set_value, default='', + use="Path to cdrom") + +gopts.var('macaddr', val='MACADDR', + fn=set_value, default='', + use="Macaddress of the first network interface") + +gopts.var('boot', val="a|b|c|d", + fn=set_value, default='c', + use="Default boot device") + +gopts.var('nographic', val='no|yes', + fn=set_bool, default=0, + use="Should device models use graphics?") + +gopts.var('sdl', val='', + fn=set_value, default=None, + use="""Should the device model use SDL?""") + +gopts.var('display', val='DISPLAY', + fn=set_value, default='localhost:0', + use="X11 display to use") def strip(pre, s): """Strip prefix 'pre' if present. @@ -382,12 +442,11 @@ def configure_vmx(opts, config_devs, vals): """Create the config for VMX devices. """ - memmap = vals.memmap - device_model = vals.device_model - device_config = vals.device_config - config_devs.append(['memmap', memmap]) - config_devs.append(['device_model', device_model]) - config_devs.append(['device_config', device_config]) + args = [ 'memmap', 'device_model', 'hda', 'hdb', 'hdc', 'hdd', 'cdrom', + 'boot', 'fda', 'fdb', 'localtime', 'serial', 'macaddr', 'stdvga', + 'isa', 'nographic', 'vnc', 'sdl', 'display'] + for a in args: + config_devs.append([a, vals.__dict__[a]]) def run_bootloader(opts, config, vals): if not os.access(vals.bootloader, os.X_OK): @@ -614,10 +673,13 @@ if '=' in arg: (var, val) = arg.strip().split('=', 1) gopts.setvar(var.strip(), val.strip()) + opts.vals.display = os.getenv("DISPLAY") if opts.vals.config: config = opts.vals.config else: opts.load_defconfig() + if opts.vals.dryrun: + opts.vals.vnc = 0 preprocess(opts, opts.vals) if not opts.getopt('name') and opts.getopt('defconfig'): opts.setopt('name', os.path.basename(opts.getopt('defconfig'))) diff -r 23833ae55425 -r febfcd0a1a0a xen/include/asm-x86/vmx_platform.h --- a/xen/include/asm-x86/vmx_platform.h Tue Jun 28 16:38:30 2005 +++ b/xen/include/asm-x86/vmx_platform.h Thu Jun 30 03:20:48 2005 @@ -77,7 +77,7 @@ struct cpu_user_regs *inst_decoder_regs; }; -struct virutal_platform_def { +struct virtual_platform_def { unsigned long *real_mode_data; /* E820, etc. */ unsigned long shared_page_va; struct vmx_virpit_t vmx_pit; diff -r 23833ae55425 -r febfcd0a1a0a tools/ioemu/monitor.c --- a/tools/ioemu/monitor.c Tue Jun 28 16:38:30 2005 +++ b/tools/ioemu/monitor.c Thu Jun 30 03:20:48 2005 @@ -353,6 +353,8 @@ "", "show i8259 (PIC) state", }, { "pci", "", pci_info, "", "show PCI info", }, + { "vmxiopage", "", sp_info, + "", "show VMX device model shared page info", }, { NULL, NULL, }, }; diff -r 23833ae55425 -r febfcd0a1a0a tools/examples/xmexample.vmx --- a/tools/examples/xmexample.vmx Tue Jun 28 16:38:30 2005 +++ b/tools/examples/xmexample.vmx Thu Jun 30 03:20:48 2005 @@ -87,18 +87,12 @@ #============================================================================ + # New stuff +device_model = '/usr/bin/qemu-dm' + +# Advanced users only. Don't touch if you don't know what you're doing memmap = '/etc/xen/mem-map.sxp' -device_model = '/usr/bin/device-model' -device_config = '/etc/xen/xmexample.vmx' - -#============================================================================ -# -# config item for qemu device model -# Note: no space between = -#----------------------------------------------------------------------------- -# Qemu binary path -qemubin='/usr/bin/qemu-dm' #----------------------------------------------------------------------------- # Disk image for diff -r 23833ae55425 -r febfcd0a1a0a xen/include/asm-x86/vmx.h --- a/xen/include/asm-x86/vmx.h Tue Jun 28 16:38:30 2005 +++ b/xen/include/asm-x86/vmx.h Thu Jun 30 03:20:48 2005 @@ -25,6 +25,8 @@ #include <asm/processor.h> #include <asm/vmx_vmcs.h> #include <asm/i387.h> + +#include <public/io/ioreq.h> extern void vmx_asm_vmexit_handler(struct cpu_user_regs); extern void vmx_asm_do_resume(void); @@ -337,4 +339,14 @@ return (cr0 & X86_CR0_PE) && (cr0 & X86_CR0_PG); } +static inline vcpu_iodata_t *get_vio(struct domain *d, unsigned long cpu) +{ + return &((shared_iopage_t *) d->arch.vmx_platform.shared_page_va)->vcpu_iodata[cpu]; +} + +static inline int iopacket_port(struct domain *d) +{ + return ((shared_iopage_t *) d->arch.vmx_platform.shared_page_va)->sp_global.eport; +} + #endif /* __ASM_X86_VMX_H__ */ diff -r 23833ae55425 -r febfcd0a1a0a tools/libxc/xc_vmx_build.c --- a/tools/libxc/xc_vmx_build.c Tue Jun 28 16:38:30 2005 +++ b/tools/libxc/xc_vmx_build.c Thu Jun 30 03:20:48 2005 @@ -8,6 +8,7 @@ #include "xc_elf.h" #include <stdlib.h> #include <zlib.h> +#include <xen/io/ioreq.h> #include "linux_boot_params.h" #define L1_PROT (_PAGE_PRESENT|_PAGE_RW|_PAGE_ACCESSED|_PAGE_USER) @@ -173,6 +174,9 @@ unsigned long vpt_start; unsigned long vpt_end; unsigned long v_end; + + unsigned long shared_page_frame = 0; + shared_iopage_t *sp; memset(&dsi, 0, sizeof(struct domain_setup_info)); @@ -382,6 +386,8 @@ boot_paramsp->e820_map[i].addr = mem_mapp->map[i].addr; boot_paramsp->e820_map[i].size = mem_mapp->map[i].size; boot_paramsp->e820_map[i].type = mem_mapp->map[i].type; + if (mem_mapp->map[i].type == E820_SHARED) + shared_page_frame = (mem_mapp->map[i].addr >> PAGE_SHIFT); } munmap(boot_paramsp, PAGE_SIZE); @@ -406,6 +412,15 @@ for ( i = 0; i < MAX_VIRT_CPUS; i++ ) shared_info->vcpu_data[i].evtchn_upcall_mask = 1; munmap(shared_info, PAGE_SIZE); + + /* Populate the event channel port in the shared page */ + if ((sp = (shared_iopage_t *) xc_map_foreign_range( + xc_handle, dom, PAGE_SIZE, PROT_READ|PROT_WRITE, + page_array[shared_page_frame])) == 0) + goto error_out; + memset(sp, 0, PAGE_SIZE); + sp->sp_global.eport = control_evtchn; + munmap(sp, PAGE_SIZE); /* * Pin down l2tab addr as page dir page - causes hypervisor to provide diff -r 23833ae55425 -r febfcd0a1a0a xen/arch/x86/vmx.c --- a/xen/arch/x86/vmx.c Tue Jun 28 16:38:30 2005 +++ b/xen/arch/x86/vmx.c Thu Jun 30 03:20:48 2005 @@ -388,7 +388,7 @@ return; } - vio = (vcpu_iodata_t *) d->arch.arch_vmx.vmx_platform.shared_page_va; + vio = get_vio(d->domain, d->vcpu_id); if (vio == 0) { printk("bad shared page: %lx", (unsigned long) vio); domain_crash_synchronous(); @@ -458,7 +458,7 @@ set_bit(ARCH_VMX_IO_WAIT, &d->arch.arch_vmx.flags); p->state = STATE_IOREQ_READY; - evtchn_send(IOPACKET_PORT); + evtchn_send(iopacket_port(d->domain)); vmx_wait_io(); } @@ -1260,7 +1260,7 @@ (unsigned long)regs.eax, (unsigned long)regs.ebx, (unsigned long)regs.ecx, (unsigned long)regs.edx, (unsigned long)regs.esi, (unsigned long)regs.edi); - v->arch.arch_vmx.vmx_platform.mpci.inst_decoder_regs = ®s; + v->domain->arch.vmx_platform.mpci.inst_decoder_regs = ®s; if (!(error = vmx_do_page_fault(va, ®s))) { /* diff -r 23833ae55425 -r febfcd0a1a0a xen/include/asm-x86/vmx_intercept.h --- a/xen/include/asm-x86/vmx_intercept.h Tue Jun 28 16:38:30 2005 +++ b/xen/include/asm-x86/vmx_intercept.h Thu Jun 30 03:20:48 2005 @@ -8,7 +8,6 @@ #include <xen/time.h> #include <xen/errno.h> #include <public/io/ioreq.h> - #define MAX_IO_HANDLER 6 diff -r 23833ae55425 -r febfcd0a1a0a xen/arch/x86/vmx_vmcs.c --- a/xen/arch/x86/vmx_vmcs.c Tue Jun 28 16:38:30 2005 +++ b/xen/arch/x86/vmx_vmcs.c Thu Jun 30 03:20:48 2005 @@ -151,8 +151,10 @@ /* Initialise shared page */ mpfn = phys_to_machine_mapping(gpfn); p = map_domain_page(mpfn); - memset(p, 0, PAGE_SIZE); - d->arch.arch_vmx.vmx_platform.shared_page_va = (unsigned long)p; + d->domain->arch.vmx_platform.shared_page_va = (unsigned long)p; + + clear_bit(iopacket_port(d->domain), + &d->domain->shared_info->evtchn_mask[0]); return 0; } diff -r 23833ae55425 -r febfcd0a1a0a xen/include/asm-x86/vmx_vmcs.h --- a/xen/include/asm-x86/vmx_vmcs.h Tue Jun 28 16:38:30 2005 +++ b/xen/include/asm-x86/vmx_vmcs.h Thu Jun 30 03:20:48 2005 @@ -68,7 +68,6 @@ unsigned long cpu_cr3; unsigned long cpu_state; struct msr_state msr_content; - struct virutal_platform_def vmx_platform; }; #define vmx_schedule_tail(next) \ diff -r 23833ae55425 -r febfcd0a1a0a tools/ioemu/target-i386-dm/Makefile --- a/tools/ioemu/target-i386-dm/Makefile Tue Jun 28 16:38:30 2005 +++ b/tools/ioemu/target-i386-dm/Makefile Thu Jun 30 03:20:48 2005 @@ -390,7 +390,7 @@ ifneq ($(PROGS),) install -m 755 -s $(PROGS) "$(DESTDIR)$(bindir)" endif - install -m 755 device-model "$(DESTDIR)$(bindir)" + install -m 755 qemu-dm.debug "$(DESTDIR)$(bindir)" install -m 755 qemu-ifup "$(DESTDIR)$(configdir)" gunzip -c qemu-vgaram-bin.gz >qemu-vgaram-bin install -m 755 qemu-vgaram-bin "$(DESTDIR)$(configdir)" diff -r 23833ae55425 -r febfcd0a1a0a xen/arch/x86/vmx_io.c --- a/xen/arch/x86/vmx_io.c Tue Jun 28 16:38:30 2005 +++ b/xen/arch/x86/vmx_io.c Thu Jun 30 03:20:48 2005 @@ -317,10 +317,11 @@ struct mi_per_cpu_info *mpci_p; struct cpu_user_regs *inst_decoder_regs; - mpci_p = &v->arch.arch_vmx.vmx_platform.mpci; + mpci_p = &v->domain->arch.vmx_platform.mpci; inst_decoder_regs = mpci_p->inst_decoder_regs; - vio = (vcpu_iodata_t *) v->arch.arch_vmx.vmx_platform.shared_page_va; + vio = get_vio(v->domain, v->vcpu_id); + if (vio == 0) { VMX_DBG_LOG(DBG_LEVEL_1, "bad shared page: %lx", (unsigned long) vio); @@ -356,10 +357,10 @@ } int size = -1, index = -1; - size = operand_size(v->arch.arch_vmx.vmx_platform.mpci.mmio_target); - index = operand_index(v->arch.arch_vmx.vmx_platform.mpci.mmio_target); - - if (v->arch.arch_vmx.vmx_platform.mpci.mmio_target & WZEROEXTEND) { + size = operand_size(v->domain->arch.vmx_platform.mpci.mmio_target); + index = operand_index(v->domain->arch.vmx_platform.mpci.mmio_target); + + if (v->domain->arch.vmx_platform.mpci.mmio_target & WZEROEXTEND) { p->u.data = p->u.data & 0xffff; } set_reg_value(size, index, 0, regs, p->u.data); @@ -404,18 +405,18 @@ int vmx_clear_pending_io_event(struct vcpu *v) { struct domain *d = v->domain; + int port = iopacket_port(d); /* evtchn_pending is shared by other event channels in 0-31 range */ - if (!d->shared_info->evtchn_pending[IOPACKET_PORT>>5]) - clear_bit(IOPACKET_PORT>>5, &v->vcpu_info->evtchn_pending_sel); + if (!d->shared_info->evtchn_pending[port>>5]) + clear_bit(port>>5, &v->vcpu_info->evtchn_pending_sel); /* Note: VMX domains may need upcalls as well */ if (!v->vcpu_info->evtchn_pending_sel) clear_bit(0, &v->vcpu_info->evtchn_upcall_pending); - /* clear the pending bit for IOPACKET_PORT */ - return test_and_clear_bit(IOPACKET_PORT, - &d->shared_info->evtchn_pending[0]); + /* clear the pending bit for port */ + return test_and_clear_bit(port, &d->shared_info->evtchn_pending[0]); } /* Because we've cleared the pending events first, we need to guarantee that @@ -437,17 +438,17 @@ void vmx_wait_io() { extern void do_block(); + int port = iopacket_port(current->domain); do { - if(!test_bit(IOPACKET_PORT, - ¤t->domain->shared_info->evtchn_pending[0])) + if(!test_bit(port, ¤t->domain->shared_info->evtchn_pending[0])) do_block(); vmx_check_events(current); if (!test_bit(ARCH_VMX_IO_WAIT, ¤t->arch.arch_vmx.flags)) break; /* Events other than IOPACKET_PORT might have woken us up. In that case, safely go back to sleep. */ - clear_bit(IOPACKET_PORT>>5, ¤t->vcpu_info->evtchn_pending_sel); + clear_bit(port>>5, ¤t->vcpu_info->evtchn_pending_sel); clear_bit(0, ¤t->vcpu_info->evtchn_upcall_pending); } while(1); } @@ -522,7 +523,8 @@ { vcpu_iodata_t *vio; - vio = (vcpu_iodata_t *) d->arch.arch_vmx.vmx_platform.shared_page_va; + vio = get_vio(d->domain, d->vcpu_id); + if (vio == 0) { VMX_DBG_LOG(DBG_LEVEL_1, "bad shared page: %lx", (unsigned long) vio); @@ -536,7 +538,8 @@ { vcpu_iodata_t *vio; - vio = (vcpu_iodata_t *) d->arch.arch_vmx.vmx_platform.shared_page_va; + vio = get_vio(d->domain, d->vcpu_id); + if (vio == 0) { VMX_DBG_LOG(DBG_LEVEL_1, "bad shared page: %lx", (unsigned long) vio); @@ -555,7 +558,7 @@ { int highest_vector = find_highest_pending_irq(d); unsigned long intr_fields, eflags; - struct vmx_virpit_t *vpit = &(d->arch.arch_vmx.vmx_platform.vmx_pit); + struct vmx_virpit_t *vpit = &(d->domain->arch.vmx_platform.vmx_pit); if (highest_vector == -1) return; diff -r 23833ae55425 -r febfcd0a1a0a tools/python/xen/xend/image.py --- a/tools/python/xen/xend/image.py Tue Jun 28 16:38:30 2005 +++ b/tools/python/xen/xend/image.py Thu Jun 30 03:20:48 2005 @@ -231,7 +231,7 @@ ostype = "vmx" memmap = None - memmap_value = None + memmap_value = [] device_channel = None def createImage(self): @@ -242,9 +242,12 @@ self.createDomain() def buildDomain(self): + # Create an event channel + self.device_channel = channel.eventChannel(0, self.vm.getDomain()) + log.info("VMX device model port: %d", self.device_channel.port2) return xc.vmx_build(dom = self.vm.getDomain(), image = self.kernel, - control_evtchn = 0, + control_evtchn = self.device_channel.port2, memsize = self.vm.memory, memmap = self.memmap_value, cmdline = self.cmdline, @@ -254,51 +257,74 @@ def parseMemmap(self): self.memmap = sxp.child_value(self.vm.config, "memmap") if self.memmap is None: - raise VmError("missing memmap") + return memmap = sxp.parse(open(self.memmap))[0] from xen.util.memmap import memmap_parse self.memmap_value = memmap_parse(memmap) - def createDeviceModel_old(self): - device_model = sxp.child_value(self.vm.config, 'device_model') - if not device_model: - raise VmError("vmx: missing device model") - device_config = sxp.child_value(self.vm.config, 'device_config') - if not device_config: - raise VmError("vmx: missing device config") - # Create an event channel. - self.device_channel = channel.eventChannel(0, self.vm.getDomain()) - # Execute device model. - #todo: Error handling - os.system(device_model - + " -f %s" % device_config - + " -d %d" % self.vm.getDomain() - + " -p %d" % self.device_channel['port1'] - + " -m %s" % self.vm.memory) - + # Return a list of cmd line args to the device models based on the + # xm config file + def parseDeviceModelArgs(self): + dmargs = [ 'hda', 'hdb', 'hdc', 'hdd', 'cdrom', 'boot', 'fda', 'fdb', + 'localtime', 'serial', 'macaddr', 'stdvga', 'isa' ] + ret = [] + for a in dmargs: + v = sxp.child_value(self.vm.config, a) + + # python doesn't allow '-' in variable names + if a == 'stdvga': a = 'std-vga' + + # Handle booleans gracefully + if a in ['localtime', 'std-vga', 'isa']: + v = int(v) + + log.debug("args: %s, val: %s" % (a,v)) + if v: + ret.append("-%s" % a) + ret.append("%s" % v) + + # Handle graphics library related options + vnc = int(sxp.child_value(self.vm.config, 'vnc')) + sdl = int(sxp.child_value(self.vm.config, 'sdl')) + nographic = int(sxp.child_value(self.vm.config, 'nographic')) + if nographic: + ret.append('-nographic') + return ret + + if vnc and sdl: + ret = ret + ['-vnc-and-sdl', '-k', 'en-us'] + elif vnc: + ret = ret + ['-vnc', '-k', 'en-us'] + if vnc: + vncport = int(self.vm.getDomain()) + 5900 + ret = ret + ['-vncport', '%d' % vncport] + return ret + def createDeviceModel(self): device_model = sxp.child_value(self.vm.config, 'device_model') if not device_model: raise VmError("vmx: missing device model") - device_config = sxp.child_value(self.vm.config, 'device_config') - if not device_config: - raise VmError("vmx: missing device config") - # Create an event channel - self.device_channel = channel.eventChannel(0, self.vm.getDomain()) # Execute device model. #todo: Error handling # XXX RN: note that the order of args matter! - os.system(device_model - + " -f %s" % device_config - + self.vncParams() - + " -d %d" % self.vm.getDomain() - + " -p %d" % (int(self.device_channel.port1)-1) - + " -m %s" % self.vm.memory) + args = [device_model] + vnc = self.vncParams() + if len(vnc): + args = args + vnc + args = args + ([ "-d", "%d" % self.vm.getDomain(), + "-p", "%d" % self.device_channel.port1, + "-m", "%s" % self.vm.memory ]) + args = args + self.parseDeviceModelArgs() + env = dict(os.environ) + env['DISPLAY'] = sxp.child_value(self.vm.config, 'display') + log.info("spawning device models: %s %s", device_model, args) + self.pid = os.spawnve(os.P_NOWAIT, device_model, args, env) + log.info("device model pid: %d", self.pid) def vncParams(self): # see if a vncviewer was specified # XXX RN: bit of a hack. should unify this, maybe stick in config space - vncconnect="" + vncconnect=[] image = self.config args = sxp.child_value(image, "args") if args: @@ -306,12 +332,14 @@ for arg in arg_list: al = string.split(arg, '=') if al[0] == "VNC_VIEWER": - vncconnect=" -v %s" % al[1] + vncconnect=["-vncconnect", "%s" % al[1]] break return vncconnect def destroy(self): channel.eventChannelClose(self.device_channel) + os.system("kill -KILL" + + " %d" % self.pid) def getDomainMemory(self, mem_mb): return (mem_mb * 1024) + self.getPageTableSize(mem_mb) diff -r 23833ae55425 -r febfcd0a1a0a xen/arch/x86/vmx_platform.c --- a/xen/arch/x86/vmx_platform.c Tue Jun 28 16:38:30 2005 +++ b/xen/arch/x86/vmx_platform.c Thu Jun 30 03:20:48 2005 @@ -565,10 +565,11 @@ struct cpu_user_regs *inst_decoder_regs; extern long evtchn_send(int lport); - mpci_p = ¤t->arch.arch_vmx.vmx_platform.mpci; + mpci_p = ¤t->domain->arch.vmx_platform.mpci; inst_decoder_regs = mpci_p->inst_decoder_regs; - vio = (vcpu_iodata_t *) d->arch.arch_vmx.vmx_platform.shared_page_va; + vio = get_vio(d->domain, d->vcpu_id); + if (vio == NULL) { printk("bad shared page\n"); domain_crash_synchronous(); @@ -612,7 +613,7 @@ p->port_mm, p->size, p->addr, value, p->count); #endif - evtchn_send(IOPACKET_PORT); + evtchn_send(iopacket_port(d->domain)); vmx_wait_io(); } @@ -626,7 +627,7 @@ unsigned char inst[MAX_INST_LEN]; int vm86, ret; - mpci_p = ¤t->arch.arch_vmx.vmx_platform.mpci; + mpci_p = ¤t->domain->arch.vmx_platform.mpci; inst_decoder_regs = mpci_p->inst_decoder_regs; __vmread(GUEST_RIP, &eip); diff -r 23833ae55425 -r febfcd0a1a0a xen/arch/x86/vmx_intercept.c --- a/xen/arch/x86/vmx_intercept.c Tue Jun 28 16:38:30 2005 +++ b/xen/arch/x86/vmx_intercept.c Thu Jun 30 03:20:48 2005 @@ -35,7 +35,7 @@ int vmx_io_intercept(ioreq_t *p) { struct vcpu *d = current; - struct vmx_handler_t *handler = &(d->arch.arch_vmx.vmx_platform.vmx_handler); + struct vmx_handler_t *handler = &(d->domain->arch.vmx_platform.vmx_handler); int i; unsigned long addr, offset; for (i = 0; i < handler->num_slot; i++) { @@ -51,7 +51,7 @@ int register_io_handler(unsigned long addr, unsigned long offset, intercept_action_t action) { struct vcpu *d = current; - struct vmx_handler_t *handler = &(d->arch.arch_vmx.vmx_platform.vmx_handler); + struct vmx_handler_t *handler = &(d->domain->arch.vmx_platform.vmx_handler); int num = handler->num_slot; if (num >= MAX_IO_HANDLER) { @@ -163,7 +163,7 @@ int intercept_pit_io(ioreq_t *p) { struct vcpu *d = current; - struct vmx_virpit_t *vpit = &(d->arch.arch_vmx.vmx_platform.vmx_pit); + struct vmx_virpit_t *vpit = &(d->domain->arch.vmx_platform.vmx_pit); if (p->size != 1 || p->pdata_valid || @@ -206,10 +206,10 @@ */ void vmx_hooks_assist(struct vcpu *d) { - vcpu_iodata_t *vio = (vcpu_iodata_t *) d->arch.arch_vmx.vmx_platform.shared_page_va; + vcpu_iodata_t * vio = get_vio(d->domain, d->vcpu_id); ioreq_t *p = &vio->vp_ioreq; unsigned long *intr = &(vio->vp_intr[0]); - struct vmx_virpit_t *vpit = &(d->arch.arch_vmx.vmx_platform.vmx_pit); + struct vmx_virpit_t *vpit = &(d->domain->arch.vmx_platform.vmx_pit); int rw_mode; /* load init count*/ diff -r 23833ae55425 -r febfcd0a1a0a tools/ioemu/exec.c --- a/tools/ioemu/exec.c Tue Jun 28 16:38:30 2005 +++ b/tools/ioemu/exec.c Thu Jun 30 03:20:48 2005 @@ -127,7 +127,7 @@ void cpu_set_log(int log_flags) { loglevel = log_flags; - if (loglevel && !logfile) { + if (!logfile) { logfile = fopen(logfilename, "w"); if (!logfile) { perror(logfilename); diff -r 23833ae55425 -r febfcd0a1a0a tools/ioemu/vl.h --- a/tools/ioemu/vl.h Tue Jun 28 16:38:30 2005 +++ b/tools/ioemu/vl.h Thu Jun 30 03:20:48 2005 @@ -624,6 +624,7 @@ uint32_t pic_intack_read(CPUState *env); void pic_info(void); void irq_info(void); +void sp_info(void); int pic_irq2vec(int irq); /* i8254.c */ diff -r 23833ae55425 -r febfcd0a1a0a tools/ioemu/vl.c --- a/tools/ioemu/vl.c Tue Jun 28 16:38:30 2005 +++ b/tools/ioemu/vl.c Thu Jun 30 03:20:48 2005 @@ -116,7 +116,7 @@ int64_t ticks_per_sec; int boot_device = 'c'; int ram_size; -int domid; +int domid = -1; static char network_script[1024]; int pit_min_timer_count = 0; int nb_nics; @@ -2402,6 +2402,9 @@ macaddr[4] = 0x34; macaddr[5] = 0x56; + /* init debug */ + cpu_set_log(0); + optind = 1; for(;;) { if (optind >= argc) @@ -2808,10 +2811,13 @@ exit(-1); } - shared_page = xc_map_foreign_range(xc_handle, domid, PAGE_SIZE, PROT_READ|PROT_WRITE, page_array[nr_pages - 1]); + + + fprintf(logfile, "shared page at pfn:%lx, mfn: %lx\n", (nr_pages-1), + (page_array[nr_pages - 1])); /* we always create the cdrom drive, even if no disk is there */ bdrv_init(); diff -r 23833ae55425 -r febfcd0a1a0a tools/ioemu/hw/i8254.c --- a/tools/ioemu/hw/i8254.c Tue Jun 28 16:38:30 2005 +++ b/tools/ioemu/hw/i8254.c Thu Jun 30 03:20:48 2005 @@ -217,7 +217,7 @@ void pit_reset_vmx_vectors() { - extern void *shared_page; + extern shared_iopage_t *shared_page; ioreq_t *req; int irq, i; PITChannelState *s; @@ -239,7 +239,7 @@ s = &pit_state.channels[vmx_channel]; fprintf(logfile, "VMX_PIT:guest init pit channel %d!\n", vmx_channel); - req = &((vcpu_iodata_t *) shared_page)->vp_ioreq; + req = &shared_page->vcpu_iodata[0].vp_ioreq; req->state = STATE_IORESP_HOOK; /* diff -r 23833ae55425 -r febfcd0a1a0a xen/arch/x86/domain.c --- a/xen/arch/x86/domain.c Tue Jun 28 16:38:30 2005 +++ b/xen/arch/x86/domain.c Thu Jun 30 03:20:48 2005 @@ -345,7 +345,7 @@ v->arch.schedule_tail = arch_vmx_do_launch; #if defined (__i386) - v->arch.arch_vmx.vmx_platform.real_mode_data = + v->domain->arch.vmx_platform.real_mode_data = (unsigned long *) regs->esi; #endif @@ -356,7 +356,6 @@ */ memset(&v->domain->shared_info->evtchn_mask[0], 0xff, sizeof(v->domain->shared_info->evtchn_mask)); - clear_bit(IOPACKET_PORT, &v->domain->shared_info->evtchn_mask[0]); /* Put the domain in shadow mode even though we're going to be using * the shared 1:1 page table initially. It shouldn't hurt */ @@ -906,7 +905,7 @@ v->arch.arch_vmx.vmcs = 0; free_monitor_pagetable(v); - rem_ac_timer(&v->arch.arch_vmx.vmx_platform.vmx_pit.pit_timer); + rem_ac_timer(&v->domain->arch.vmx_platform.vmx_pit.pit_timer); } #else #define vmx_relinquish_resources(_v) ((void)0) diff -r 23833ae55425 -r febfcd0a1a0a xen/include/public/io/ioreq.h --- a/xen/include/public/io/ioreq.h Tue Jun 28 16:38:30 2005 +++ b/xen/include/public/io/ioreq.h Thu Jun 30 03:20:48 2005 @@ -29,8 +29,6 @@ #define STATE_IORESP_READY 3 #define STATE_IORESP_HOOK 4 -#define IOPACKET_PORT 2 - /* VMExit dispatcher should cooperate with instruction decoder to prepare this structure and notify service OS and DM by sending virq */ @@ -53,9 +51,23 @@ #define BITS_PER_BYTE 8 #define INTR_LEN (MAX_VECTOR/(BITS_PER_BYTE * sizeof(unsigned long))) +/* We only track the master PIC state here */ +typedef struct { + uint16_t irr; /* interrupt request register */ + uint16_t imr; /* interrupt mask register */ + uint16_t isr; /* interrupt service register */ + + int eport; /* Event channel port */ +} global_iodata_t; + typedef struct { ioreq_t vp_ioreq; unsigned long vp_intr[INTR_LEN]; } vcpu_iodata_t; +typedef struct { + global_iodata_t sp_global; + vcpu_iodata_t vcpu_iodata[1]; +} shared_iopage_t; + #endif /* _IOREQ_H_ */ diff -r 23833ae55425 -r febfcd0a1a0a tools/ioemu/target-i386-dm/qemu-dm.debug --- /dev/null Tue Jun 28 16:38:30 2005 +++ b/tools/ioemu/target-i386-dm/qemu-dm.debug Thu Jun 30 03:20:48 2005 @@ -0,0 +1,5 @@ +#!/bin/sh + +echo $* > /tmp/args +echo $DISPLAY >> /tmp/args +exec /usr/bin/qemu-dm $* diff -r 23833ae55425 -r febfcd0a1a0a tools/ioemu/target-i386-dm/device-model --- a/tools/ioemu/target-i386-dm/device-model Tue Jun 28 16:38:30 2005 +++ /dev/null Thu Jun 30 03:20:48 2005 @@ -1,91 +0,0 @@ -#!/bin/sh - -. /etc/rc.d/init.d/functions - -qemubin=/usr/bin/qemu-dm - -ulimit -c unlimited - -# Use this for debugging: -#gdb --args /usr/sbin/qemu-dm -hda /var/images/qemu-linux.img -nographic \ -# -serial pty -l 'ioport,int' $* - -# XXX this is a bit skanky. we assume an order of arguments here. -# namely to have configfile and vncconnect argument as the first -# two arguments. - -while getopts ":f:v:d:" opt; -do - case $opt in - f) QEMUCONFIGFILE=$OPTARG;; - v) VNCCONNECT=$OPTARG;; - d) DOMAIN=$OPTARG;; - \?) echo;; - esac -done -if [ "x$QEMUCONFIGFILE" != "x" ]; then shift; shift; fi -if [ "x$VNCCONNECT" != "x" ]; then shift; shift; fi - - -echo $QEMUCONFIGFILE -if [ ! -z $QEMUCONFIGFILE ];then - . $QEMUCONFIGFILE -else - echo "no config file specified!" > /dev/tty - echo "no config file specified!" >> /tmp/qemustart.log - exit -fi - -PARMETER="" - -if [ ! -z $hda ];then -PARMETER="$PARMETER -hda $hda" -fi - -if [ ! -z $hdb ];then -PARMETER="$PARMETER -hdb $hdb" -fi - -if [ ! -z $hdc ];then -PARMETER="$PARMETER -hdc $hdc" -fi - -if [ ! -z $hdd ];then -PARMETER="$PARMETER -hdd $hdd" -fi - -if [ ! -z $cdrom ];then -PARMETER="$PARMETER -cdrom $cdrom" -fi - -if [ ! -z $boot ];then -PARMETER="$PARMETER -boot $boot" -fi - -if [ ! -z $nographic ] && [ $nographic -eq 1 ];then -PARMETER="$PARMETER -nographic" -fi - -vnc=${vnc:=1} -sdl=${sdl:=0} -if qemu-dm 2>&1 |grep vnc > /dev/null;then - if [ $vnc -eq 1 ] && [ $sdl -eq 1 ];then - PARMETER="$PARMETER -vnc-and-sdl -k en-us" - elif [ $vnc -eq 1 ];then - PARMETER="$PARMETER -vnc -k en-us" - fi - VNCPORT=`expr 5900 + $DOMAIN` - PARMETER="$PARMETER -vncport $VNCPORT" - if [ "x$VNCCONNECT" != "x" ]; then - PARMETER="$PARMETER -vncconnect $VNCCONNECT" - fi -fi - -#optional cmdline for qemu -# -nographic \ -# -serial pty \ - - -PARMETER="$PARMETER -l int $*"; -echo "$qemubin $PARMETER" >>/tmp/qemustart.log -$qemubin $PARMETER & _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |