search for: for_each_vcpu

Displaying 18 results from an estimated 18 matches for "for_each_vcpu".

Did you mean: for_each_cpu
2012 Sep 18
6
[PATCH 2/5] Xen/MCE: vMCE injection
...00 @@ -340,48 +340,27 @@ int inject_vmce(struct domain *d) { - int cpu = smp_processor_id(); + struct vcpu *v; - /* PV guest and HVM guest have different vMCE# injection methods. */ - if ( !test_and_set_bool(d->vcpu[0]->mce_pending) ) + /* inject vMCE to all vcpus */ + for_each_vcpu(d, v) { - if ( d->is_hvm ) + if ( !test_and_set_bool(v->mce_pending) && + ((d->is_hvm) || + guest_has_trap_callback(d, v->vcpu_id, TRAP_machine_check)) ) { - mce_printk(MCE_VERBOSE, "MCE: inject vMCE to HVM DO...
2013 Nov 20
2
[PATCH] hvm: reset TSC to 0 after domain resume from S3
....3d48978 100644 --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -3736,8 +3736,13 @@ static void hvm_s3_suspend(struct domain *d) static void hvm_s3_resume(struct domain *d) { + struct vcpu *v; if ( test_and_clear_bool(d->arch.hvm_domain.is_s3_suspended) ) + { + for_each_vcpu( d, v ) + hvm_set_guest_tsc( v, 0 ); domain_unpause(d); + } } static int hvmop_set_isa_irq_level( -- 1.8.4.rc3
2013 Mar 27
2
[PATCH] x86/S3: Restore broken vcpu affinity on resume (v3)
...; diff --git a/xen/common/schedule.c b/xen/common/schedule.c index 83fae4c..3861923 100644 --- a/xen/common/schedule.c +++ b/xen/common/schedule.c @@ -541,6 +541,38 @@ void vcpu_force_reschedule(struct vcpu *v) } } +void restore_vcpu_affinity(struct domain *d) +{ + struct vcpu *v; + + for_each_vcpu ( d, v ) + { + vcpu_schedule_lock_irq(v); + + if (v->affinity_broken) + { + printk("Restoring vcpu affinity for domain %d vcpu %d\n", + v->domain->domain_id, v->vcpu_id); + cpumask_copy(v->cpu_affinity, v->c...
2012 Aug 23
2
[PATCH] nvmx: fix resource relinquish for nested VMX
...nvcpu->nv_n1vmcx; + nvmx_purge_vvmcs(v); if ( nvcpu->nv_n2vmcx ) { __vmpclear(virt_to_maddr(nvcpu->nv_n2vmcx)); @@ -65,6 +68,14 @@ void nvmx_vcpu_destroy(struct vcpu *v) } } +void nvmx_domain_relinquish_resources(struct domain *d) +{ + struct vcpu *v; + + for_each_vcpu ( d, v ) + nvmx_purge_vvmcs(v); +} + int nvmx_vcpu_reset(struct vcpu *v) { return 0; diff --git a/xen/include/asm-x86/hvm/hvm.h b/xen/include/asm-x86/hvm/hvm.h index 7243c4e..3592a8c 100644 --- a/xen/include/asm-x86/hvm/hvm.h +++ b/xen/include/asm-x86/hvm/hvm.h @@ -179,6 +179,7 @@ str...
2013 Feb 21
2
[PATCH v3] x86/nhvm: properly clean up after failure to set up all vCPU-s
...c = -EINVAL; /* Set up NHVM state for any vcpus that are already up */ - if ( !d->arch.hvm_domain.params[HVM_PARAM_NESTEDHVM] ) + if ( a.value && + !d->arch.hvm_domain.params[HVM_PARAM_NESTEDHVM] ) for_each_vcpu(d, v) if ( rc == 0 ) rc = nestedhvm_vcpu_initialise(v); + if ( !a.value || rc ) + for_each_vcpu(d, v) + nestedhvm_vcpu_destroy(v); break; case HVM_PARAM_BUFIO...
2013 Oct 08
3
Re: [PATCH v4 1/9] xen/arm: Implement hvm save and restore
...t;> + spin_unlock(&rank->lock); >> +} >> + >> + >> +static int gic_save(struct domain *d, hvm_domain_context_t *h) >> +{ >> + struct hvm_hw_gic ctxt; >> + struct vcpu *v; >> + >> + /* Save the state of GICs */ >> + for_each_vcpu( d, v ) >> + { >> + ctxt.gic_hcr = v->arch.gic_hcr; >> + ctxt.gic_vmcr = v->arch.gic_vmcr; >> + ctxt.gic_apr = v->arch.gic_apr; >> + >> + /* Save list registers and masks */ >> + /* (it is not necessary to save...
2006 Jan 25
0
changing max vcpus threshold while a domain is running
...e). Xen needs auditing for races before * removing this check. */ ret = -EINVAL; if ( test_bit(_VCPUF_initialised, &d->vcpu[0]->vcpu_flags) ) goto maxvcpu_out; Do you know which race condition is being avoided by this check for _VCPUF_initialised? Could it be the for_each_vcpu macro only checks for null and a vcpu structure could be alloc''d but not initialized, and then used inside the macro? Thanks, Ryan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2013 Feb 15
1
[PATCH 3/4] xen/arm: dump gic debug info from arch_dump_domain_info
...etions(-) diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c index e37ec54..817e800 100644 --- a/xen/arch/arm/domain.c +++ b/xen/arch/arm/domain.c @@ -568,6 +568,12 @@ int domain_relinquish_resources(struct domain *d) void arch_dump_domain_info(struct domain *d) { + struct vcpu *v; + + for_each_vcpu ( d, v ) + { + gic_dump_info(v); + } } long arch_do_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg) diff --git a/xen/arch/arm/gic.c b/xen/arch/arm/gic.c index 88f2d3a..9db1f57 100644 --- a/xen/arch/arm/gic.c +++ b/xen/arch/arm/gic.c @@ -677,6 +677,33 @@ static void maintenan...
2013 Nov 22
1
[PATCH v2 13/15] xen: arm: Add debug keyhandler to dump the physical GIC state.
...nclude/asm-arm/gic.h | 2 +- 3 files changed, 78 insertions(+), 3 deletions(-) diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c index 52d2403..59eea75 100644 --- a/xen/arch/arm/domain.c +++ b/xen/arch/arm/domain.c @@ -713,7 +713,7 @@ void arch_dump_domain_info(struct domain *d) for_each_vcpu ( d, v ) { - gic_dump_info(v); + gic_dump_info_guest(v); } } diff --git a/xen/arch/arm/gic.c b/xen/arch/arm/gic.c index 9711f5d..1f32e99 100644 --- a/xen/arch/arm/gic.c +++ b/xen/arch/arm/gic.c @@ -28,6 +28,7 @@ #include <xen/softirq.h> #include <xen/list.h>...
2011 Sep 23
1
[PATCH] Add save/restore support for viridian APIC assist pfn
...R_SAVE_RESTORE(VIRIDIAN_DOMAIN, viridian_save_domain_ctxt, + viridian_load_domain_ctxt, 1, HVMSR_PER_DOM); + +static int viridian_save_vcpu_ctxt(struct domain *d, hvm_domain_context_t *h) +{ + struct vcpu *v; + + if ( !is_viridian_domain(d) ) + return 0; + + for_each_vcpu( d, v ) { + struct hvm_viridian_vcpu_context ctxt; + + ctxt.apic_assist = v->arch.hvm_vcpu.viridian.apic_assist.raw; + + if ( hvm_save_entry(VIRIDIAN_VCPU, v->vcpu_id, h, &ctxt) != 0 ) + return 1; + } + + return 0; +} + +static int viridian_load_vcpu_...
2011 Dec 20
0
sedf: remove useless tracing printk and harmonize comments style.
...t(const struct sche if ( (op->u.sedf.extratime & EXTRA_AWARE) && (!op->u.sedf.period) ) { - /* Weight-driven domains with extratime only. */ + /* Weight-driven domains with extratime only */ for_each_vcpu ( p, v ) { EDOM_INFO(v)->extraweight = op->u.sedf.weight; @@ -1425,7 +1347,7 @@ static int sedf_adjust(const struct sche } else { - /* Weight-driven domains with real-time execution. */ +...
2013 Apr 20
8
xen-unstable: commit commit 63753b3e0dc56efb1acf94fa46f3fee7bc59281c leaves HVM guest dangling after shutdown or destroy.
Hi, Commit 63753b3e0dc56efb1acf94fa46f3fee7bc59281c x86: allow VCPUOP_register_vcpu_info to work again on PVHVM guests Leaves HVM guests dangling after shutdown or destroy: xl list gives: (null) 16 0 4 --p--d 11.5 (null) 17 0 1 --ps-d 12.0 (first was destroyed, second shutdown) The
2012 Feb 08
18
[PATCH 0 of 4] Prune outdated/impossible preprocessor symbols, and update VIOAPIC emulation
Patch 1 removes CONFIG_SMP Patch 2 removes separate smp_{,r,w}mb()s as a result of patch 1 Patch 4 removes __ia64__ defines from the x86 arch tree Patch 3 is related to patch 4 and changes the VIOAPIC to emulate version 0x20 as a performance gain. It preceeds Patch 4 so as to be more clear about the functional change. Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
2011 Nov 17
12
[PATCH] Avoid panic when adjusting sedf parameters
When using sedf scheduler in a cpupool the system might panic when setting sedf scheduling parameters for a domain. Signed-off-by: juergen.gross@ts.fujitsu.com 1 file changed, 4 insertions(+) xen/common/sched_sedf.c | 4 ++++ _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2005 Oct 10
13
[PATCH] 0/2 VCPU creation and allocation
I''ve put together two patches. The first introduces a new dom0_op, set_max_vcpus, which with an associated variable and a check in the VCPUOP handler fixes [1]bug 288. Also included is a new VCPUOP, VCPUOP_create, which handles all of the vcpu creation tasks and leaves initialization and unpausing to VCPUOP_initialize. The separation allows for build-time allocation of vcpus which
2013 Mar 21
27
[PATCH 0/4] xen/arm: guest SMP support
Hi all, this small patch series implement guest SMP support for ARM, using the ARM PSCI interface for secondary cpu bringup. Stefano Stabellini (4): xen/arm: basic PSCI support, implement cpu_on xen/arm: support for guest SGI xen/arm: support vcpu_op hypercalls xen: move VCPUOP_register_vcpu_info to common code xen/arch/arm/domain.c | 66 ++++++++++++++++++++++++
2013 Sep 23
57
[PATCH RFC v13 00/20] Introduce PVH domU support
This patch series is a reworking of a series developed by Mukesh Rathor at Oracle. The entirety of the design and development was done by him; I have only reworked, reorganized, and simplified things in a way that I think makes more sense. The vast majority of the credit for this effort therefore goes to him. This version is labelled v13 because it is based on his most recent series, v11.
2012 Jan 25
26
[PATCH v4 00/23] Xenstore stub domain
Changes from v3: - mini-os configuration files moved into stubdom/ - mini-os extra console support now a config option - Fewer #ifdefs - grant table setup uses hypercall bounce - Xenstore stub domain syslog support re-enabled Changes from v2: - configuration support added to mini-os build system - add mini-os support for conditionally compiling frontends, xenbus -