search for: domain_relinquish_resources

Displaying 13 results from an estimated 13 matches for "domain_relinquish_resources".

2007 Aug 28
6
[PATCH] Make XEN_DOMCTL_destroydomain hypercall continuable.
...-r 2c9db26f1d0e xen/arch/ia64/xen/domain.c --- a/xen/arch/ia64/xen/domain.c Fri Aug 24 16:32:56 2007 +0100 +++ b/xen/arch/ia64/xen/domain.c Tue Aug 28 13:06:41 2007 +0900 @@ -936,7 +936,7 @@ static void relinquish_memory(struct dom spin_unlock_recursive(&d->page_alloc_lock); } -void domain_relinquish_resources(struct domain *d) +int domain_relinquish_resources(struct domain *d) { /* Relinquish guest resources for VT-i domain. */ if (d->vcpu[0] && VMX_DOMAIN(d->vcpu[0])) @@ -954,6 +954,8 @@ void domain_relinquish_resources(struct /* Free page used by xen oprofile buffer */...
2008 Aug 21
2
doubt on releasing domain pages
Hi, I am trying to release domU pages from page_list and xenpage_list after domU shutdown while retaining the rest of the domain information. To achieve this in __domain_finalise_shutdown i call domain_relinquish_resources. This is failing to release pages from page_list for type PGT_l2_page_tables and crashing dom0. To be specific, while testing on mini-os i saw that when domain_relinquish_resources calls relinquish_memory for PGT_l2_page_tables, this eventually calls free_l2_table which fails at map_domain_page()...
2008 Dec 02
0
[PATCH] Fix Xen panic with oprofile
...[2] http://lkml.org/lkml/2008/11/17/282 Signed-off-by: Niraj Tolia <niraj.tolia@hp.com> diff -r 18eff064c628 xen/arch/ia64/xen/domain.c --- a/xen/arch/ia64/xen/domain.c Fri Aug 22 10:45:19 2008 +0100 +++ b/xen/arch/ia64/xen/domain.c Mon Dec 01 23:52:14 2008 -0800 @@ -1673,9 +1673,6 @@ int domain_relinquish_resources(struct d if (is_hvm_domain(d) && d->arch.sal_data) xfree(d->arch.sal_data); - /* Free page used by xen oprofile buffer */ - free_xenoprof_pages(d); - return 0; } diff -r 18eff064c628 xen/arch/x86/domain.c --- a/xen/arch/x86/domain.c Fri Aug 22 10:45:19 2008 +0100 +++ b/xen/a...
2013 Apr 20
8
xen-unstable: commit commit 63753b3e0dc56efb1acf94fa46f3fee7bc59281c leaves HVM guest dangling after shutdown or destroy.
Hi, Commit 63753b3e0dc56efb1acf94fa46f3fee7bc59281c x86: allow VCPUOP_register_vcpu_info to work again on PVHVM guests Leaves HVM guests dangling after shutdown or destroy: xl list gives: (null) 16 0 4 --p--d 11.5 (null) 17 0 1 --ps-d 12.0 (first was destroyed, second shutdown) The
2013 Feb 15
1
[PATCH 3/4] xen/arm: dump gic debug info from arch_dump_domain_info
...| 27 +++++++++++++++++++++++++++ xen/include/asm-arm/gic.h | 3 +++ 3 files changed, 36 insertions(+), 0 deletions(-) diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c index e37ec54..817e800 100644 --- a/xen/arch/arm/domain.c +++ b/xen/arch/arm/domain.c @@ -568,6 +568,12 @@ int domain_relinquish_resources(struct domain *d) void arch_dump_domain_info(struct domain *d) { + struct vcpu *v; + + for_each_vcpu ( d, v ) + { + gic_dump_info(v); + } } long arch_do_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg) diff --git a/xen/arch/arm/gic.c b/xen/arch/arm/gic.c index 88f2d3a..9d...
2006 Mar 29
0
Assertion ''! IS_INVALID_M2P_ENTRY(gpfn)'' failed kills machine
...t;ff14b380>] put_shadow_ref+0x12c/0x12e (XEN) [<ff14bc56>] shadow_unpin+0xb2/0xb4 (XEN) [<ff14c484>] free_shadow_pages+0x3b9/0x43f (XEN) [<ff14f52e>] __shadow_mode_disable+0x2a/0x11c (XEN) [<ff12ab9a>] shadow_mode_disable+0x83/0x134 (XEN) [<ff12aac3>] domain_relinquish_resources+0x188/0x1dc (XEN) [<ff105317>] domain_kill+0x6b/0xa7 (XEN) [<ff1039df>] do_dom0_op+0x8d9/0x19d4 (XEN) [<ff180ac7>] hypercall+0x97/0xb7 (XEN) (XEN) (XEN) **************************************** (XEN) Panic on CPU 0: (XEN) CPU0 FATAL TRAP: vector = 6 (invalid opcode) (XEN)...
2010 Nov 04
4
Bug#602378: xen-hypervisor-4.0-amd64: Live migration of Guests crashes and reboots
...m_l4e+0x57/0xd0 (XEN) [<ffff82c48015f477>] free_page_type+0x1e7/0x650 (XEN) [<ffff82c48015fa1c>] __put_page_type+0x13c/0x2d0 (XEN) [<ffff82c48015d7b8>] get_page+0x28/0xf0 (XEN) [<ffff82c48014f338>] relinquish_memory+0x278/0x450 (XEN) [<ffff82c48014f989>] domain_relinquish_resources+0x1d9/0x270 (XEN) [<ffff82c48010611b>] domain_kill+0x7b/0x100 (XEN) [<ffff82c480103f54>] domctl_lock_acquire+0x44/0x70 (XEN) [<ffff82c48010465e>] do_domctl+0x4ae/0x1050 (XEN) [<ffff82c48014ab4d>] vcpu_kick+0x1d/0x80 (XEN) [<ffff82c48015d7b8>] get_page+0x...
2006 Aug 03
3
RE: [Patch][RFC] Support "xm dump" (is Re: Re: [Patch]Enable "sysrq c" handler for domU coredump)
Two things: 1. I''m not convinced ''xm crash'' is needed - ''xm destroy'' will do this (and if you want a dump, do ''xm dump'' followed by ''xm destroy'') 2. I don''t see the point of the --noreboot option on ''xm dump'' -- I think this command should simply live-dump the specified domain - as
2013 Oct 16
4
[PATCH 1/7] xen: vNUMA support for PV guests
...b/xen/common/domain.c @@ -539,6 +539,7 @@ int domain_kill(struct domain *d) tmem_destroy(d->tmem); domain_set_outstanding_pages(d, 0); d->tmem = NULL; + domain_vnuma_destroy(&d->vnuma); /* fallthrough */ case DOMDYING_dying: rc = domain_relinquish_resources(d); @@ -1287,6 +1288,15 @@ int continue_hypercall_on_cpu( return 0; } +void domain_vnuma_destroy(struct domain_vnuma_info *v) +{ + v->nr_vnodes = 0; + xfree(v->vnuma_memblks); + xfree(v->vcpu_to_vnode); + xfree(v->vdistance); + xfree(v->vnode_to_pnode); +} + /...
2013 Mar 21
27
[PATCH 0/4] xen/arm: guest SMP support
Hi all, this small patch series implement guest SMP support for ARM, using the ARM PSCI interface for secondary cpu bringup. Stefano Stabellini (4): xen/arm: basic PSCI support, implement cpu_on xen/arm: support for guest SGI xen/arm: support vcpu_op hypercalls xen: move VCPUOP_register_vcpu_info to common code xen/arch/arm/domain.c | 66 ++++++++++++++++++++++++
2013 Sep 23
57
[PATCH RFC v13 00/20] Introduce PVH domU support
This patch series is a reworking of a series developed by Mukesh Rathor at Oracle. The entirety of the design and development was done by him; I have only reworked, reorganized, and simplified things in a way that I think makes more sense. The vast majority of the credit for this effort therefore goes to him. This version is labelled v13 because it is based on his most recent series, v11.
2012 Jan 09
39
[PATCH v4 00/25] xen: ARMv7 with virtualization extensions
Hello everyone, this is the fourth version of the patch series that introduces ARMv7 with virtualization extensions support in Xen. The series allows Xen and Dom0 to boot on a Cortex-A15 based Versatile Express simulator. See the following announce email for more informations about what we are trying to achieve, as well as the original git history: See
2011 Dec 06
57
[PATCH RFC 00/25] xen: ARMv7 with virtualization extensions
Hello everyone, this is the very first version of the patch series that introduces ARMv7 with virtualization extensions support in Xen. The series allows Xen and Dom0 to boot on a Cortex-A15 based Versatile Express simulator. See the following announce email for more informations about what we are trying to achieve, as well as the original git history: See