Displaying 10 results from an estimated 10 matches for "info_for_irq".
2009 Aug 25
1
[PATCH] XEN: remove undefined functions
...tchn = evtchn,
- .cpu = 0, .u.pirq = { .gsi = gsi, .vector = vector } };
-}
-
/*
* Accessors for packed IRQ information.
*/
@@ -177,26 +170,6 @@ static unsigned virq_from_irq(unsigned irq)
return info->u.virq;
}
-static unsigned gsi_from_irq(unsigned irq)
-{
- struct irq_info *info = info_for_irq(irq);
-
- BUG_ON(info == NULL);
- BUG_ON(info->type != IRQT_PIRQ);
-
- return info->u.pirq.gsi;
-}
-
-static unsigned vector_from_irq(unsigned irq)
-{
- struct irq_info *info = info_for_irq(irq);
-
- BUG_ON(info == NULL);
- BUG_ON(info->type != IRQT_PIRQ);
-
- return info->u.pirq.vector...
2009 Aug 25
1
[PATCH] XEN: remove undefined functions
...tchn = evtchn,
- .cpu = 0, .u.pirq = { .gsi = gsi, .vector = vector } };
-}
-
/*
* Accessors for packed IRQ information.
*/
@@ -177,26 +170,6 @@ static unsigned virq_from_irq(unsigned irq)
return info->u.virq;
}
-static unsigned gsi_from_irq(unsigned irq)
-{
- struct irq_info *info = info_for_irq(irq);
-
- BUG_ON(info == NULL);
- BUG_ON(info->type != IRQT_PIRQ);
-
- return info->u.pirq.gsi;
-}
-
-static unsigned vector_from_irq(unsigned irq)
-{
- struct irq_info *info = info_for_irq(irq);
-
- BUG_ON(info == NULL);
- BUG_ON(info->type != IRQT_PIRQ);
-
- return info->u.pirq.vector...
2009 Aug 25
1
[PATCH] XEN: remove undefined functions
...tchn = evtchn,
- .cpu = 0, .u.pirq = { .gsi = gsi, .vector = vector } };
-}
-
/*
* Accessors for packed IRQ information.
*/
@@ -177,26 +170,6 @@ static unsigned virq_from_irq(unsigned irq)
return info->u.virq;
}
-static unsigned gsi_from_irq(unsigned irq)
-{
- struct irq_info *info = info_for_irq(irq);
-
- BUG_ON(info == NULL);
- BUG_ON(info->type != IRQT_PIRQ);
-
- return info->u.pirq.gsi;
-}
-
-static unsigned vector_from_irq(unsigned irq)
-{
- struct irq_info *info = info_for_irq(irq);
-
- BUG_ON(info == NULL);
- BUG_ON(info->type != IRQT_PIRQ);
-
- return info->u.pirq.vector...
2012 May 23
17
[PATCH] bug-fixes to hvc-xen driver in v3.4 (and earlier).
Three of the patches could be squashed in one, but it makes more sense
to review them as three. These patches fix the case of an PVHVM
guest not being able to resume propely b/c of hitting:
142 BUG_ON(info->type != IRQT_UNBOUND && info->type != type);
(in events.c) and also adds a WARN to catch situations like these.
The reason for this is that the Xen python toolstack
2012 Oct 22
4
xen_evtchn_do_upcall
...| __xen_evtchn_do_upcall() {
1) 0.119 us | irq_to_desc();
1) | handle_edge_irq() {
1) 0.107 us | _raw_spin_lock();
1) | ack_dynirq() {
1) | evtchn_from_irq() {
1) | info_for_irq() {
1) | irq_get_irq_data() {
1) 0.052 us | irq_to_desc();
1) 0.418 us | }
1) 0.782 us | }
1) 1.135 us | }
1) 0.049 us | irq_move_irq();
1) 1.800 us | }
1)...
2014 Oct 13
2
kernel crashes after soft lockups in xen domU
...? get_cycles+0x5/0x8
[354047.224054] [<ffffffff8124561e>] ?
add_interrupt_randomness+0x38/0x155
[354047.224054] [<ffffffff8109124d>] ?
handle_irq_event_percpu+0x50/0x17d
[354047.224054] [<ffffffff8121ca3a>] ? disable_pirq+0x2/0x2
[354047.224054] [<ffffffff8121c624>] ? info_for_irq+0x7/0x17
[354047.224054] [<ffffffff81093847>] ? handle_percpu_irq+0x3a/0x4f
[354047.224054] [<ffffffff8121c866>] ?
__xen_evtchn_do_upcall+0xd3/0x287
[354047.224054] [<ffffffff8104b780>] ? __local_bh_enable+0x40/0x77
[354047.224054] [<ffffffff813576ac>] ? call_softirq+0x...
2008 Nov 13
69
[PATCH 00 of 38] xen: add more Xen dom0 support
Hi Ingo,
Here''s the chunk of patches to add Xen Dom0 support (it''s probably
worth creating a new xen/dom0 topic branch for it).
A dom0 Xen domain is basically the same as a normal domU domain, but
it has extra privileges to directly access hardware. There are two
issues to deal with:
- translating to and from the domain''s pseudo-physical addresses and
real machine
2014 Nov 05
0
kernel crashes after soft lockups in xen domU
...4047.224054] [<ffffffff8124561e>] ?
> add_interrupt_randomness+0x38/0x155
> [354047.224054] [<ffffffff8109124d>] ?
> handle_irq_event_percpu+0x50/0x17d
> [354047.224054] [<ffffffff8121ca3a>] ? disable_pirq+0x2/0x2
> [354047.224054] [<ffffffff8121c624>] ? info_for_irq+0x7/0x17
> [354047.224054] [<ffffffff81093847>] ? handle_percpu_irq+0x3a/0x4f
> [354047.224054] [<ffffffff8121c866>] ?
> __xen_evtchn_do_upcall+0xd3/0x287
> [354047.224054] [<ffffffff8104b780>] ? __local_bh_enable+0x40/0x77
> [354047.224054] [<ffffffff813576...
2013 Aug 27
4
Is: Xen 4.2 and using 'xl' to save/restore is buggy with PVHVM Linux guests (v3.10 and v3.11 and presumarily earlier as well). Works with Xen 4.3 and Xen 4.4. Was:Re: FAILURE 3.11.0-rc7upstream(x86_64) 3.11.0-rc7upstream(i386)\: 2013-08-26 (tst001)
...98] [<c1077a77>] ? pvclock_clocksource_read+0xd7/0x170
[ 43.193098] [<c1039d75>] ? xen_clocksource_read+0x25/0x40
[ 43.193098] [<c1103dd4>] handle_irq_event_percpu+0x54/0x200
[ 43.193098] [<c1106438>] ? irq_get_irq_data+0x8/0x10
[ 43.193098] [<c134b188>] ? info_for_irq+0x8/0x20
[ 43.193098] [<c1106724>] handle_percpu_irq+0x34/0x50
[ 43.193098] [<c134ba0d>] __xen_evtchn_do_upcall+0x2cd/0x2e0
[ 43.193098] [<c10d7f54>] ? tick_check_idle+0xb4/0xc0
[ 43.193098] [<c134ba4b>] xen_evtchn_do_upcall+0x1b/0x30
[ 43.193098] [<c15c303...
2013 Feb 01
45
netback Oops then xenwatch stuck in D state
We''ve been hitting the following issue on a variety of hosts and recent
Xen/dom0 version combinations. Here''s an excerpt from our latest:
Xen: 4.1.4 (xenbits @ 23432)
Dom0: 3.7.1-x86_64
BUG: unable to handle kernel NULL pointer dereference at 000000000000001c
IP: [<ffffffff8141a301>] evtchn_from_irq+0x11/0x40
PGD 0
Oops: 0000 [#1] SMP
Modules linked in: ebt_comment