Displaying 4 results from an estimated 4 matches for "pirq_guest_unmask".
2006 Apr 19
0
[patch] define and use cpu_test_and_clear() and some type checking fixes
...i++ )
- clear_bit(vector_to_irq(vector), &action->guest[i]-
>pirq_mask);
+ clear_bit(vector_to_irq(vector), &action->guest[i]-
>pirq_mask[0]);
action->in_flight = 0;
spin_unlock(&desc->lock);
}
@@ -311,7 +311,7 @@ int pirq_guest_unmask(struct domain *d)
spin_lock_irq(&desc->lock);
if ( !test_bit(d->pirq_to_evtchn[pirq], &s->evtchn_mask[0]) &&
- test_and_clear_bit(pirq, &d->pirq_mask) )
+ test_and_clear_bit(pirq, &d->pirq_mask[0]) )
{...
2008 Sep 26
2
RE: [Xen-changelog] [xen-unstable] x86: Properly synchronise updates to pirq-to-vector mapping.
...GUEST 16 /* IRQ is handled by guest OS(es) */
-#define IRQ_LEVEL 64 /* IRQ level triggered */
#define IRQ_PER_CPU 256 /* IRQ is per CPU */
/*
@@ -78,7 +77,7 @@ extern int pirq_guest_eoi(struct domain
extern int pirq_guest_eoi(struct domain *d, int irq);
extern int pirq_guest_unmask(struct domain *d);
extern int pirq_guest_bind(struct vcpu *v, int irq, int will_share);
-extern void pirq_guest_unbind(struct domain *d, int irq);
+extern int pirq_guest_unbind(struct domain *d, int irq);
static inline void set_native_irq_info(int irq, cpumask_t mask)
{
_______________________...
2006 Oct 04
0
[PATCH,RFC 6/17] 32-on-64 shared info handling
...2006-10-04/xen/arch/x86/irq.c 2006-10-04 15:11:03.000000000 +0200
@@ -13,6 +13,7 @@
#include <xen/perfc.h>
#include <xen/sched.h>
#include <xen/keyhandler.h>
+#include <xen/compat.h>
#include <asm/current.h>
#include <asm/smpboot.h>
@@ -332,7 +333,7 @@ int pirq_guest_unmask(struct domain *d)
irq < NR_IRQS;
irq = find_next_bit(d->pirq_mask, NR_IRQS, irq+1) )
{
- if ( !test_bit(d->pirq_to_evtchn[irq], s->evtchn_mask) )
+ if ( !test_bit(d->pirq_to_evtchn[irq], __shared_info_addr(d, s, evtchn_mask)) )
__...
2011 Jul 07
6
Xen unstable on NetBSD
Hello,
I''m trying to compile Xen unstable on NetBSD, I''ve aplied the patches
from http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/sysutils/xentools41/patches/?only_with_tag=MAIN
and copied the blk files from
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/sysutils/xentools41/files/?only_with_tag=MAIN
(I don''t know which of these patches have been applied to xen
unstable, so