Displaying 7 results from an estimated 7 matches for "domain_flags".
Did you mean:
domain_class
2009 Jun 19
0
Re: [libvirt] domain.info() sometimes returns state zero for running machines
Sorry but I misunderstood your last post completely :-D but now I tried
what you said, using the CVS version. I also dumped the "ret" value from
virXen_getdomaininfo. The output was simple: ret=1, domain_flags=0
(right after XEN_GETDOMAININFO_FLAGS!!!). Sadly I don''t have much time
to dig deeper but it seems to me that this happens very seldom or
sometimes not at all (hard to debug).
Daniel P. Berrange wrote:
> On Thu, Jun 18, 2009 at 09:40:08AM +0100, Andreas Sommer wrote:
>
>&...
2007 Nov 27
4
spurious warnings from get_page() via gnttab_copy() during frontend shutdown
...and they were freed).
__gnttab_copy() itself seems prepared for this situation, as failures
to grab the target page due to a dying domain are correctly handled:
if ( !get_page_and_type(mfn_to_page(d_frame), dd,
PGT_writable_page) )
{
if ( !test_bit(_DOMF_dying, &dd->domain_flags) )
gdprintk(XENLOG_WARNING, "Could not get dst frame %lx
\n", d_frame);
rc = GNTST_general_error;
goto error_out;
}
In our testing we believe that we''re following this path (_DOMF_dying
is set and rc == GNTST_general_error) and that we hand...
2007 Feb 14
0
[PATCH 11/12] Allow vcpu to pause self
...ating to a new CPU. */
#define _VCPUF_migrating 13
#define VCPUF_migrating (1UL<<_VCPUF_migrating)
+ /* VCPU needs full context sync once switched out */
+#define _VCPUF_need_sync 14
+#define VCPUF_need_sync (1UL<<_VCPUF_need_sync)
/*
* Per-domain flags (domain_flags).
@@ -465,6 +468,7 @@ static inline int vcpu_runnable(struct v
void vcpu_pause(struct vcpu *v);
void vcpu_pause_nosync(struct vcpu *v);
+void vcpu_pause_self(void);
void domain_pause(struct domain *d);
void vcpu_unpause(struct vcpu *v);
void domain_unpause(struct domain *d);
______________...
2006 Oct 04
0
[PATCH,RFC 6/17] 32-on-64 shared info handling
...====
--- 2006-10-04.orig/xen/arch/x86/domain_build.c 2006-10-04 15:10:46.000000000 +0200
+++ 2006-10-04/xen/arch/x86/domain_build.c 2006-10-04 15:11:03.000000000 +0200
@@ -325,6 +325,7 @@ int construct_dom0(struct domain *d,
l1_pgentry_t gdt_l1e;
set_bit(_DOMF_compat, &d->domain_flags);
+ v->vcpu_info = (void *)&d->shared_info->compat.vcpu_info[0];
if ( nr_pages != (unsigned int)nr_pages )
nr_pages = UINT_MAX;
@@ -735,7 +736,7 @@ int construct_dom0(struct domain *d,
/* Mask all upcalls... */
for ( i = 0; i < MAX_VIRT_CPU...
2005 Nov 10
2
[PATCH][RESEND] xm reboot for vmx domain
This patch fixes the bug that "xm reboot <domid>" can not reboot vmx
domain.
In xm reboot process, control panel will wait until DomU notified it.
Unlike DomU, vmx domain can not passively do that, since it runs
unmodified OS. This patch adds the missing logic in control panel.
Any comment?
Signed-off-by: Xu Dan <dan.d.xu@intel.com >
Yu Ke
2006 Aug 03
3
RE: [Patch][RFC] Support "xm dump" (is Re: Re: [Patch]Enable "sysrq c" handler for domU coredump)
Two things:
1. I''m not convinced ''xm crash'' is needed - ''xm destroy'' will do this
(and if you want
a dump, do ''xm dump'' followed by ''xm destroy'')
2. I don''t see the point of the --noreboot option on ''xm dump'' -- I
think this command
should simply live-dump the specified domain - as
2006 Dec 01
1
[PATCH 2/10] Add support for netfront/netback acceleration drivers
...ruct domain
DECLARE_BITMAP(pirq_mask, NR_IRQS);
/* I/O capabilities (access to IRQs and memory-mapped I/O). */
- struct rangeset *iomem_caps;
+ struct rangeset *iomem_caps_readwrite;
+ struct rangeset *iomem_caps_readonly;
struct rangeset *irq_caps;
unsigned long domain_flags;
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel