search for: pirq_mask

Displaying 6 results from an estimated 6 matches for "pirq_mask".

Did you mean: irq_mask
2006 Apr 19
0
[patch] define and use cpu_test_and_clear() and some type checking fixes
...ed Apr 19 10:26:37 2006 -0400 +++ b/xen/arch/x86/irq.c Wed Apr 19 11:45:07 2006 -0400 @@ -198,7 +198,7 @@ static void __do_IRQ_guest(int vector) { d = action->guest[i]; if ( (action->ack_type != ACKTYPE_NONE) && - !test_and_set_bit(irq, &d->pirq_mask) ) + !test_and_set_bit(irq, &d->pirq_mask[0]) ) action->in_flight++; send_guest_pirq(d, irq); } @@ -235,7 +235,7 @@ static void __set_eoi_ready(irq_desc_t * if ( !(desc->status & IRQ_GUEST) || (action->in_flight != 0) ||...
2006 Oct 04
0
[PATCH,RFC 6/17] 32-on-64 shared info handling
...perfc.h> #include <xen/sched.h> #include <xen/keyhandler.h> +#include <xen/compat.h> #include <asm/current.h> #include <asm/smpboot.h> @@ -332,7 +333,7 @@ int pirq_guest_unmask(struct domain *d) irq < NR_IRQS; irq = find_next_bit(d->pirq_mask, NR_IRQS, irq+1) ) { - if ( !test_bit(d->pirq_to_evtchn[irq], s->evtchn_mask) ) + if ( !test_bit(d->pirq_to_evtchn[irq], __shared_info_addr(d, s, evtchn_mask)) ) __pirq_guest_eoi(d, irq); } @@ -619,14 +620,13 @@ static void dump_irqs(unsigned char key...
2006 Dec 01
1
[PATCH 2/10] Add support for netfront/netback acceleration drivers
...ngeset_is_empty((d)->iomem_caps_readonly))) #endif /* __XEN_IOCAP_H__ */ diff -r b58bcd6551e2 xen/include/xen/sched.h --- a/xen/include/xen/sched.h Fri Dec 01 16:21:46 2006 +0000 +++ b/xen/include/xen/sched.h Fri Dec 01 16:22:41 2006 +0000 @@ -139,7 +139,8 @@ struct domain DECLARE_BITMAP(pirq_mask, NR_IRQS); /* I/O capabilities (access to IRQs and memory-mapped I/O). */ - struct rangeset *iomem_caps; + struct rangeset *iomem_caps_readwrite; + struct rangeset *iomem_caps_readonly; struct rangeset *irq_caps; unsigned long domain_flags; ________________________...
2008 Sep 26
2
RE: [Xen-changelog] [xen-unstable] x86: Properly synchronise updates to pirq-to-vector mapping.
...tor]; + ASSERT(local_irq_is_enabled()); + desc = domain_spin_lock_irq_desc(d, irq, NULL); + if ( desc == NULL ) + return; + action = (irq_guest_action_t *)desc->action; - - spin_lock_irq(&desc->lock); + vector = desc - irq_desc; ASSERT(!test_bit(irq, d->pirq_mask) || (action->ack_type != ACKTYPE_NONE)); @@ -418,7 +449,7 @@ int pirq_acktype(struct domain *d, int i unsigned int vector; vector = domain_irq_to_vector(d, irq); - if ( vector == 0 ) + if ( vector <= 0 ) return ACKTYPE_NONE; desc = &irq_desc[vec...
2008 Sep 23
9
Xen crash on dom0 shutdown
There is a BUG_ON() at xen/arch/x86/physdev.c:169 which appears to be dependent upon guest behavior (should close event channel before un-mapping pirq), rather than on internal hypervisor state. In 2.6.18, this likely goes unnoticed because pci_device_shutdown() only calls all the driver shutdown routines. In newer kernels, however, it also calls pci_msi_shutdown() and pci_msix_shutdown(), which
2007 May 30
30
[VTD][patch 0/5] HVM device assignment using vt-d
The following 5 patches are re-submissions of the vt-d patch. This set of patches has been tested against cs# 15080 and is now much more mature and tested against more environments than the original patch. Specifically, we have successfully tested the patch with following environements: - 32/64-bit Linux HVM guest - 32-bit Windows XP/Vista (64-bit should work but did not test) -