Displaying 20 results from an estimated 23 matches for "is_hvm_domain".
2011 Mar 25
2
[RFC PATCH 2/3] AMD IOMMU: Implement p2m sharing
--
Advanced Micro Devices GmbH
Sitz: Dornach, Gemeinde Aschheim,
Landkreis München Registergericht München,
HRB Nr. 43632
WEEE-Reg-Nr: DE 12919551
Geschäftsführer:
Alberto Bozzo, Andrew Bowd
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2012 Mar 20
5
[hybrid]: hang in update_wall_time
Hi Ian/Stefano:
I changed over to the PV clock for hybrid liked we talked at the
hackathon. I still have the hang in update_wall_time() after dom0
switches to xen as clocksource.
The source of hang seems to be in xen stime_local_stamp in cpu_time that
suddenly jumps to a large 64bit value. I''ve been chasing to figure
where that happens, and why for the hybrid and not PV. It appears the
2013 Sep 23
57
[PATCH RFC v13 00/20] Introduce PVH domU support
This patch series is a reworking of a series developed by Mukesh
Rathor at Oracle. The entirety of the design and development was done
by him; I have only reworked, reorganized, and simplified things in a
way that I think makes more sense. The vast majority of the credit
for this effort therefore goes to him. This version is labelled v13
because it is based on his most recent series, v11.
2008 Dec 02
0
[PATCH] Fix Xen panic with oprofile
...Signed-off-by: Niraj Tolia <niraj.tolia@hp.com>
diff -r 18eff064c628 xen/arch/ia64/xen/domain.c
--- a/xen/arch/ia64/xen/domain.c Fri Aug 22 10:45:19 2008 +0100
+++ b/xen/arch/ia64/xen/domain.c Mon Dec 01 23:52:14 2008 -0800
@@ -1673,9 +1673,6 @@ int domain_relinquish_resources(struct d
if (is_hvm_domain(d) && d->arch.sal_data)
xfree(d->arch.sal_data);
- /* Free page used by xen oprofile buffer */
- free_xenoprof_pages(d);
-
return 0;
}
diff -r 18eff064c628 xen/arch/x86/domain.c
--- a/xen/arch/x86/domain.c Fri Aug 22 10:45:19 2008 +0100
+++ b/xen/arch/x86/domain.c Mon Dec 01 2...
2010 Dec 14
0
[PATCH 1/5] vtdt: Define a new function gtsc_to_gtime()
...09 22:32:43 2010 +0800
+++ b/xen/arch/x86/time.c Thu Dec 09 22:32:51 2010 +0800
@@ -1634,11 +1634,20 @@ static void __init tsc_parse(const char
}
custom_param("tsc", tsc_parse);
-u64 gtime_to_gtsc(struct domain *d, u64 tsc)
+u64 gtime_to_gtsc(struct domain *d, u64 time)
{
if ( !is_hvm_domain(d) )
- tsc = max_t(s64, tsc - d->arch.vtsc_offset, 0);
- return scale_delta(tsc, &d->arch.ns_to_vtsc);
+ time = max_t(s64, time - d->arch.vtsc_offset, 0);
+ return scale_delta(time, &d->arch.ns_to_vtsc);
+}
+
+u64 gtsc_to_gtime(struct domain *d, u64 tsc)
+{
+...
2012 Jan 26
4
[PATCH] amd iommu: disable iommu emulation on non-iommu systems
Introduce a new flag to disable iommu emulation on old iommu systems.
This patch is taken from my v4 patch queue, which is till pending, to
make old or non-iommu system to run cleanly without interfered by
iommuv2 codes. This might be helpful to isolate iommuv2 code in
debugging unstable regressions. The reset part of v4 will be re-based.
Thanks,
Wei
Signed-off-by: Wei Wang
2013 Jun 07
4
[xen-unstable test] 18092: tolerable FAIL
flight 18092 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/18092/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-winxpsp3 8 guest-saverestore fail pass in 18090
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass
2007 Aug 30
0
[PATCH][Retry 1] 1/4: cpufreq/PowerNow! in Xen: Xen timer changes
...uint8_t pad[128];
} u;
};
diff -r 256160ff19b7 xen/include/xen/sched.h
--- a/xen/include/xen/sched.h Thu Aug 16 13:27:59 2007 +0100
+++ b/xen/include/xen/sched.h Thu Aug 30 12:08:29 2007 -0500
@@ -496,6 +496,9 @@ static inline void vcpu_unblock(struct v
#define is_hvm_domain(d) ((d)->is_hvm)
#define is_hvm_vcpu(v) (is_hvm_domain(v->domain))
+/* global variable for cpufreq ability */
+extern unsigned int opt_cpufreq;
+
#endif /* __SCHED_H__ */
/*
diff -r 256160ff19b7 xen/include/xen/time.h
--- a/xen/include/xen/time.h Thu Aug 16 13:27:59 2007 +0100
+++ b/...
2007 Aug 28
6
[PATCH] Make XEN_DOMCTL_destroydomain hypercall continuable.
...00
@@ -1717,7 +1717,7 @@ static void vcpu_destroy_pagetables(stru
v->arch.cr3 = 0;
}
-void domain_relinquish_resources(struct domain *d)
+int domain_relinquish_resources(struct domain *d)
{
struct vcpu *v;
@@ -1754,6 +1754,8 @@ void domain_relinquish_resources(struct
if ( is_hvm_domain(d) )
hvm_domain_relinquish_resources(d);
+
+ return 0;
}
void arch_dump_domain_info(struct domain *d)
diff -r 58d131f1fb35 -r 2c9db26f1d0e xen/common/domain.c
--- a/xen/common/domain.c Fri Aug 24 16:32:56 2007 +0100
+++ b/xen/common/domain.c Tue Aug 28 13:06:41 2007 +0900
@@ -298,26...
2012 Dec 12
2
[PATCH v7 1/2] xen: unify domain locking in domctl code
These two patches were originally part of the XSM series that I have
posted, and remain prerequisites for that series. However, they are
independent of the XSM changes and are a useful simplification
regardless of the use of XSM.
The Acked-bys on these patches were provided before rebasing them over
the copyback changes in 26268:1b72138bddda, which had minor conflicts
that I resolved.
[PATCH
2012 Mar 01
14
[PATCH 0 of 3] RFC Paging support for AMD NPT V2
There has been some progress, but still no joy. Definitely not intended for
inclusion at this point.
Tim, Wei, I added a Xen command line toggle to disable IOMMU and P2M table
sharing.
Tim, I verified that changes to p2m-pt.c don''t break shadow mode (64bit
hypervisor and Win 7 guest).
Hongkaixing, I incorporated your suggestion in patch 2, so I should add your
Signed-off-by eventually.
2012 Jan 17
2
Problems calling HVMOP_flush_tlbs
Hello xen-devel,
I am using xen 4.2.1 and have tried the following with kernel 3.0.0 and
3.2.1.
I am trying to invoke the HVMOP_flush_tlbs hypercall but have been
unsuccessful. I am basing my call on the functions in in xc_misc.c,
trying to guess what is meant by "@arg must be null" in the comment
where HVMOP_flush_tlbs is defined. What is the correct way to invoke
this
2013 Feb 21
2
[PATCH v3] x86/nhvm: properly clean up after failure to set up all vCPU-s
...ixes required by 26486:7648ef657fe7 and 26489:83a3fa9c8434.
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -3918,18 +3918,20 @@ long do_hvm_op(unsigned long op, XEN_GUE
}
if ( a.value > 1 )
rc = -EINVAL;
- if ( !is_hvm_domain(d) )
- rc = -EINVAL;
/* Remove the check below once we have
* shadow-on-shadow.
*/
if ( cpu_has_svm && !paging_mode_hap(d) && a.value )
rc = -EINVAL;
/* Set...
2016 Jan 30
0
Bug#810379: [Xen-devel] [BUG] pci-passthrough generates "xen:events: Failed to obtain physical IRQ" for some devices
...obtain physical IRQ 61 (error -22)
There is a check:
463 if ( (pirq < 0) || (pirq >= d->nr_pirqs) )
464 return -EINVAL;
But there is also a call to pirq_guest_bind, which could return EINVAL.
> Anyhow for PV guests in the hypervisor there is a check:
> 414 if ( !is_hvm_domain(d) && !pirq_access_permitted(d, pirq) )
> 415 return -EPERM;
> 416
>
> And I wonder if the XEN_DOMCTL_irq_permission aka, xc_domain_irq_permission
> had been called. I remember that at some point we missed it for Xend..
>
> Could you enable Xend debugging (...
2007 Jun 27
1
[PATCH 7/10] SMP support to Xen PM
...return -EBUSY;
-
+/* Record the last paused domain at freeze phase */
+static struct domain *pd;
+static int freeze_domains(void)
+{
+ struct domain *d;
+
+ pd = NULL;
for_each_domain(d)
if (d->domain_id != 0)
{
domain_pause(d);
if (is_hvm_domain(d) && !hvm_suspend_domain(d))
{
- error = -EINVAL;
- goto Unpause;
+ domain_unpause(d);
+ return 0;
}
pd = d;
}
-
+ return 1;
+}
+
+static void thaw_domains(void)
+{
+ struct do...
2009 Oct 23
11
soft lockups during live migrate..
Trying to migrate a 64bit PV guest with 64GB running medium to heavy load
on xen 3.4.0, it is showing lot of soft lockups. The softlockups are
causing dom0 reboot by the cluster FS. The hardware has 256GB and 32
CPUs.
Looking into the hypervisor thru kdb, I see one cpu in sh_resync_all()
while all other 31 appear spinning on the shadow_lock. I vaguely remember
seeing some thread on this while
2007 Jun 28
5
One question on MMIO
In sh_page_fault(), there are some code like following, why we think it
is mmio only when paging_vcpu_mode_translate(v)?
Thanks
Yunhong Jiang
/* What mfn is the guest trying to access? */
gfn = guest_l1e_get_gfn(gw.eff_l1e);
gmfn = vcpu_gfn_to_mfn(v, gfn);
mmio = (is_hvm_domain(d)
&& paging_vcpu_mode_translate(v)
&& mmio_space(gfn_to_paddr(gfn)));
if ( !mmio && !mfn_valid(gmfn) )
{
perfc_incr(shadow_fault_bail_bad_gfn);
SHADOW_PRINTK("BAD gfn=%"SH_PRI_gfn" gmfn=%"PRI_mfn"\n&q...
2013 Apr 20
8
xen-unstable: commit commit 63753b3e0dc56efb1acf94fa46f3fee7bc59281c leaves HVM guest dangling after shutdown or destroy.
Hi,
Commit 63753b3e0dc56efb1acf94fa46f3fee7bc59281c x86: allow VCPUOP_register_vcpu_info to work again on PVHVM guests
Leaves HVM guests dangling after shutdown or destroy:
xl list gives:
(null) 16 0 4 --p--d 11.5
(null) 17 0 1 --ps-d 12.0
(first was destroyed, second shutdown)
The
2012 May 25
0
[PATCH 3/3] gnttab: cleanup
...lock(&rgt->lock);
/* pg may be set, with a refcount included, from __get_paged_frame */
if ( !pg )
@@ -679,7 +681,7 @@ __gnttab_map_grant_ref(
goto undo_out;
}
- double_gt_lock(ld->grant_table, rd->grant_table);
+ double_gt_lock(lgt, rgt);
if ( !is_hvm_domain(ld) && need_iommu(ld) )
{
@@ -689,7 +691,7 @@ __gnttab_map_grant_ref(
BUG_ON(paging_mode_translate(ld));
/* We''re not translated, so we know that gmfns and mfns are
the same things, so the IOMMU entry is always 1-to-1. */
- mapcount(ld, rd,...
2012 Jul 18
48
LSI SAS2008 Option Rom Failure
Hi-
I am trying to pass an LSI SAS2008-based HBA (IBM M1015) through to an
HVM Solaris VM, using Xen 4.2 unstable and the qemu-traditional device
model. On boot I see the following error:
MPT BIOS Fault 09h encountered at adapter PCI(00h,05h,00h)
A list search yielded
(http://comments.gmane.org/gmane.comp.emulators.xen.devel/128172),
however there was no solution for an HVM VM. I''ve