search for: do_domctl

Displaying 20 results from an estimated 27 matches for "do_domctl".

2007 Aug 28
6
[PATCH] Make XEN_DOMCTL_destroydomain hypercall continuable.
...n.c Tue Aug 28 13:06:41 2007 +0900 @@ -55,10 +55,17 @@ int xc_domain_destroy(int xc_handle, int xc_domain_destroy(int xc_handle, uint32_t domid) { + int ret; DECLARE_DOMCTL; domctl.cmd = XEN_DOMCTL_destroydomain; domctl.domain = (domid_t)domid; - return do_domctl(xc_handle, &domctl); + for (;;) { + ret = do_domctl(xc_handle, &domctl); + if (ret && errno == EAGAIN) + continue; + break; + } + return ret; } int xc_domain_shutdown(int xc_handle, diff -r 58d131f1fb35 -r 2c9db26f1d0e xen/arch/ia64/xen/d...
2012 Dec 12
2
[PATCH v7 1/2] xen: unify domain locking in domctl code
...hey are independent of the XSM changes and are a useful simplification regardless of the use of XSM. The Acked-bys on these patches were provided before rebasing them over the copyback changes in 26268:1b72138bddda, which had minor conflicts that I resolved. [PATCH 1/2] xen: lock target domain in do_domctl common code [PATCH 2/2] xen/arch/*: add struct domain parameter to
2010 Jan 09
3
101th domU fails to start with "SETVCPUCONTEXT failed"
Hello there, We (a small hosting community) are running a steadily growing number of Xen domUs on a quad dualcore Xeon server with 64GB ram. We''ve got 100 running domUs at the moment. Trying to create a new one results in this error: Error: (1, ''Internal error'', ''launch_vm: SETVCPUCONTEXT failed (rc=-1)\n'') If I shut down another domain, I can
2011 Jan 26
9
[PATCH]vtd: Fix for irq bind failure after PCI attaching 32 times
vtd: Fix for irq bind failure after PCI attaching 32 times Originally when detaching a PCI device, pirq_to_emuirq and pirq_to_irq are freed via hypercall do_physdev_op. Now in function pt_irq_destroy_bind_vtd, duplicated logic is added to free pirq_to_emuirq, but not pirq_to_irq. This causes do_physdev_op fail to free both emuirq and irq. After attaching a PCI device for 32 times, irq resources
2007 May 04
0
[PATCH] 3/4 "nemesis" scheduling domains for Xen
...53,13 +253,13 @@ int xc_domain_hvm_getcontext(int xc_hand domctl.u.hvmcontext.size = size; set_xen_guest_handle(domctl.u.hvmcontext.buffer, ctxt_buf); - if ( ctxt_buf ) + if ( ctxt_buf ) if ( (ret = lock_pages(ctxt_buf, size)) != 0 ) return ret; ret = do_domctl(xc_handle, &domctl); - if ( ctxt_buf ) + if ( ctxt_buf ) unlock_pages(ctxt_buf, size); return (ret < 0 ? -1 : domctl.u.hvmcontext.size); @@ -338,8 +338,8 @@ int xc_shadow_control(int xc_handle, if ( stats ) memcpy(stats, &domctl.u.shadow_op.stats,...
2013 Feb 21
4
help please - running a guest from an iSCSI disk ? getting more diagnostics than "cannot make domain: -3" ? how to make domain0 "privileged" ?
...edomain; (gdb) 38 domctl.domain = (domid_t)*pdomid; (gdb) 39 domctl.u.createdomain.ssidref = ssidref; (gdb) 40 domctl.u.createdomain.flags = flags; (gdb) 41 memcpy(domctl.u.createdomain.handle, handle, sizeof(xen_domain_handle_t)); (gdb) 42 if ( (err = do_domctl(xch, &domctl)) != 0 ) (gdb) s do_domctl (domctl=0x7fffffffe0a0, xch=0x622240) at xc_private.h:239 239 DECLARE_HYPERCALL_BOUNCE(domctl, sizeof(*domctl), XC_HYPERCALL_BUFFER_BOUNCE_BOTH); (gdb) n 241 domctl->interface_version = XEN_DOMCTL_INTERFACE_VERSION; (gdb) 243 if...
2013 Mar 13
0
[PATCH 3 of 4] PoC: libxc+ocaml: add interfaces to send triggers to HVM guests
..._s_state(xc_interf return value; } +int xc_domain_trigger_power(xc_interface *xch, unsigned int domid) +{ + int ret; + DECLARE_DOMCTL; + + domctl.cmd = XEN_DOMCTL_sendtrigger; + domctl.domain = domid; + domctl.u.sendtrigger.trigger = XEN_DOMCTL_SENDTRIGGER_POWER; + + ret = do_domctl(xch, &domctl); + if (ret != 0) + ERROR("power button failed"); + return ret; +} + +int xc_domain_trigger_sleep(xc_interface *xch, unsigned int domid) +{ + int ret; + DECLARE_DOMCTL; + + domctl.cmd = XEN_DOMCTL_sendtrigger; + domctl.domain = domid; + domctl....
2011 Sep 08
5
[PATCH 0 of 2] v2: memshare/xenpaging/xen-access fixes for xen-unstable
The following two patches allow the parallel use of memsharing, xenpaging and xen-access by using an independent ring buffer for each feature. Please review. v2: - update mem_event_check_ring arguments, check domain rather than domain_id - check ring_full first because its value was just evaluated - check if ring buffer is initialized before calling mem_access_domctl/mem_paging_domctl
2009 Jan 09
5
[PATCH] Enable PCI passthrough with stub domain.
...return -EPERM; + } + } spin_lock(&pcidevs_lock); spin_lock(&d->event_lock); diff -r b9721b2766c1 xen/common/domctl.c --- a/xen/common/domctl.c Wed Jan 07 11:25:00 2009 +0000 +++ b/xen/common/domctl.c Thu Jan 08 18:58:36 2009 +0900 @@ -193,14 +193,49 @@ long do_domctl(XEN_GUEST_HANDLE(xen_domc long ret = 0; struct xen_domctl curop, *op = &curop; - if ( !IS_PRIV(current->domain) ) - return -EPERM; - if ( copy_from_guest(op, u_domctl, 1) ) return -EFAULT; if ( op->interface_version != XEN_DOMCTL_INTERFACE_VERSIO...
2008 Nov 25
7
when timer go back in dom0 save and restore or migrate, PV domain hung
...b/tools/libxc/xc_domain_restore.c Fri Nov 21 17:34:15 2008 +0800 @@ -328,6 +328,16 @@ /* For info only */ nr_pfns = 0; + //jsong@novell.com, james song + memset(&domctl, 0, sizeof(domctl)); + domctl.domain = dom; + domctl.cmd = XEN_DOMCTL_restoredomain; + frc = do_domctl(xc_handle, &domctl); + if ( frc != 0 ) + { + ERROR("Unable to set flag of restore."); + goto out; + } if ( read_exact(io_fd, &p2m_size, sizeof(unsigned long)) ) { @@ -1120,6 +1130,8 @@ /* restore saved vcpu_info and arch specific i...
2011 Dec 02
7
libxl: error when destroying domain on NetBSD
...stroy <domid>) on NetBSD I get the following error on the log file: Waiting for domain test (domid 1) to die [pid 11675] Domain 1 is dead Unknown shutdown reason code 255. Destroying domain. Action for shutdown reason code 255 is destroy Domain 1 needs to be cleaned up: destroying the domain do_domctl failed: errno 3 libxl: error: libxl.c:762:libxl_domain_destroy: xc_domain_pause failed for 1 libxl: error: libxl_dom.c:658:userdata_path: unable to find domain info for domain 1: No such file or directory do_domctl failed: errno 3 libxl: error: libxl.c:787:libxl_domain_destroy: xc_domain_destroy fa...
2013 Apr 25
17
[PATCH V3] libxl: write IO ABI for disk frontends
...terface *xch, + uint32_t domid) +{ + int ret; + uint32_t guest_width; + const char *protocol; + DECLARE_DOMCTL; + + memset(&domctl, 0, sizeof(domctl)); + domctl.domain = domid; + domctl.cmd = XEN_DOMCTL_get_address_size; + + ret = do_domctl(xch, &domctl); + + if ( ret ) + return NULL; + + guest_width = domctl.u.address_size.size; + + switch (guest_width) { + case 32: /* 32 bit guest */ + protocol = XEN_IO_PROTO_ABI_X86_32; + break; + case 64: /* 64 bit guest */ + protocol = XEN_IO_PROTO_A...
2010 Nov 04
4
Bug#602378: xen-hypervisor-4.0-amd64: Live migration of Guests crashes and reboots
...N) [<ffff82c48014f338>] relinquish_memory+0x278/0x450 (XEN) [<ffff82c48014f989>] domain_relinquish_resources+0x1d9/0x270 (XEN) [<ffff82c48010611b>] domain_kill+0x7b/0x100 (XEN) [<ffff82c480103f54>] domctl_lock_acquire+0x44/0x70 (XEN) [<ffff82c48010465e>] do_domctl+0x4ae/0x1050 (XEN) [<ffff82c48014ab4d>] vcpu_kick+0x1d/0x80 (XEN) [<ffff82c48015d7b8>] get_page+0x28/0xf0 (XEN) [<ffff82c4801e9169>] syscall_enter+0xa9/0xae (XEN) (XEN) Pagetable walk from ffff8315ffffffe4: (XEN) L4[0x106] = 00000000cf56d027 5555555555555555 (XEN) L3[0x...
2009 Jan 14
5
[PATCH] Support cross-bitness guest when core-dumping
This patch allows core-dumping to work on a cross-bit host/guest configuration, whereas previously that was not supported. It supports both PV and FV guests. The core file format generated by the host, needs to match that of the guest, so an alignment issue is addressed, along with the p2m frame list handling being done according to the guest size. Signed-off-by: Bruce Rogers
2006 Oct 17
4
[PATCH] Fix tools build on Solaris
# HG changeset patch # User john.levon@sun.com # Date 1161090606 25200 # Node ID c6bfe43048f3becda6966deceb7b70baea833b7c # Parent 03d4223c846b14fc415cfd05d970c7b4d688fddb Many of the tools use C99 features such as bool, or expect certain functions. Fix the CFLAGS to enable these on Solaris. Signed-off-by: John Levon <john.levon@sun.com> diff --git a/config/SunOS.mk b/config/SunOS.mk ---
2008 Nov 27
1
Re: RE: Re: Re: when timer go back in dom0 save and restore ormigrate, PV domain hung
...*/ nr_pfns = 0; + //jsong@novell.com, james song + memset(&domctl, 0, sizeof(domctl)); + domctl.domain = dom; + domctl.cmd = XEN_DOMCTL_restoredomain; + frc = do_domctl(xc_handle, &domctl); + if ( frc != 0 ) + { + ERROR("Unable to set flag of restore."); + goto out; + } if ( read_ex...
2013 Oct 16
4
[PATCH 1/7] xen: vNUMA support for PV guests
...100644 --- a/xen/common/domctl.c +++ b/xen/common/domctl.c @@ -29,6 +29,7 @@ #include <asm/page.h> #include <public/domctl.h> #include <xsm/xsm.h> +#include <xen/vnuma.h> static DEFINE_SPINLOCK(domctl_lock); DEFINE_SPINLOCK(vcpu_alloc_lock); @@ -871,6 +872,77 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl) } break; + case XEN_DOMCTL_setvnumainfo: + { + unsigned int i, j, nr_vnodes, dist_size; + unsigned int dist; + + ret = -EFAULT; + dist = i = j = 0; + + nr_vnodes = op->u.vnuma.nr_vnodes;...
2006 Dec 01
1
[PATCH 2/10] Add support for netfront/netback acceleration drivers
..._readonly == NULL) || + (d->irq_caps == NULL) ) goto fail4; if ( sched_init_domain(d) != 0 ) diff -r b58bcd6551e2 xen/common/domctl.c --- a/xen/common/domctl.c Fri Dec 01 16:21:46 2006 +0000 +++ b/xen/common/domctl.c Fri Dec 01 16:22:41 2006 +0000 @@ -623,7 +623,8 @@ long do_domctl(XEN_GUEST_HANDLE(xen_domc break; if ( op->u.iomem_permission.allow_access ) - ret = iomem_permit_access(d, mfn, mfn + nr_mfns - 1); + ret = iomem_permit_access(d, mfn, mfn + nr_mfns - 1, + op->u.iomem_permissio...
2006 Nov 20
1
compilation bug
...elf_x86_64 -T xen.lds -N \ boot/x86_64.o /home/test1/xen-unstable/xen/common/built_in.o /home/test1/xen-unstable/xen/drivers/built_in.o /home/test1/xen-unstable/xen/arch/x86/built_in.o -o /home/test1/xen-unstable/xen/xen-syms /home/test1/xen-unstable/xen/common/built_in.o: In function `do_domctl'': /home/test1/xen-unstable/xen/common/domctl.c:656: undefined reference to `__stack_chk_fail'' /home/test1/xen-unstable/xen/common/domctl.c:656: relocation truncated to fit: R_X86_64_PLT32 against undefined symbol `__stack_chk_fail'' /home/test1/xen-unstable/xen/common/buil...
2012 Aug 10
18
[PATCH v2 0/5] ARM hypercall ABI: 64 bit ready
Hi all, this patch series makes the necessary changes to make sure that the current ARM hypercall ABI can be used as-is on 64 bit ARM platforms: - it defines xen_ulong_t as uint64_t on ARM; - it introduces a new macro to handle guest pointers, called XEN_GUEST_HANDLE_PARAM (that has size 4 bytes on aarch and is going to have size 8 bytes on aarch64); - it replaces all the occurrences of