search for: vcpu_id

Displaying 20 results from an estimated 73 matches for "vcpu_id".

2008 Sep 11
5
[PATCH] Fix arguments passed to SHADOW_PRINTK
...ch/x86/mm/shadow/common.c Thu Sep 11 09:25:28 2008 +0900 @@ -701,7 +701,8 @@ static void _sh_resync(struct vcpu *v, m ASSERT(!sh_page_has_multiple_shadows(mfn_to_page(gmfn))); SHADOW_PRINTK("d=%d, v=%d, gmfn=%05lx, va=%lx\n", - v->domain->domain_id, v->vcpu_id, mfn_x(gmfn), va); + v->domain->domain_id, v->vcpu_id, mfn_x(gmfn), + sh_map_domain_page(gmfn)); /* Need to pull write access so the page *stays* in sync. */ if ( oos_remove_write_access(v, gmfn, fixup) ) @@ -953,7 +954,8 @@ int sh_unsync(struct...
2012 Sep 18
6
[PATCH 2/5] Xen/MCE: vMCE injection
...if ( !test_and_set_bool(d->vcpu[0]->mce_pending) ) + /* inject vMCE to all vcpus */ + for_each_vcpu(d, v) { - if ( d->is_hvm ) + if ( !test_and_set_bool(v->mce_pending) && + ((d->is_hvm) || + guest_has_trap_callback(d, v->vcpu_id, TRAP_machine_check)) ) { - mce_printk(MCE_VERBOSE, "MCE: inject vMCE to HVM DOM %d\n", - d->domain_id); - vcpu_kick(d->vcpu[0]); + mce_printk(MCE_VERBOSE, "MCE: inject vMCE to dom%d vcpu%d\n", +...
2011 Dec 20
0
sedf: remove useless tracing printk and harmonize comments style.
...s_time_t extra_time_tot; #ifdef SEDF_STATS @@ -158,18 +151,16 @@ static inline void extraq_del(struct vcp { struct list_head *list = EXTRALIST(d,i); ASSERT(extraq_on(d,i)); - PRINT(3, "Removing domain %i.%i from L%i extraq\n", - d->domain->domain_id, d->vcpu_id, i); list_del(list); list->next = NULL; ASSERT(!extraq_on(d, i)); } -/* adds a domain to the queue of processes which are aware of extra time. List - is sorted by score, where a lower score means higher priority for an extra - slice. It also updates the score, by simply sub...
2007 Dec 10
0
[PATCH] avoid duplication of domain ID in messages
...+++ 2007-12-10/xen/arch/x86/hvm/hvm.c 2007-12-10 09:22:53.000000000 +0100 @@ -533,8 +533,7 @@ static void hvm_vcpu_down(void) struct domain *d = v->domain; int online_count = 0; - gdprintk(XENLOG_INFO, "DOM%d/VCPU%d: going offline.\n", - d->domain_id, v->vcpu_id); + gdprintk(XENLOG_INFO, "VCPU%d: going offline.\n", v->vcpu_id); /* Doesn''t halt us immediately, but we''ll never return to guest context. */ set_bit(_VPF_down, &v->pause_flags); @@ -550,8 +549,7 @@ static void hvm_vcpu_down(void) /* ... Sh...
2015 Oct 09
0
[PATCH 1/2] kvm/x86: Hyper-V synthetic interrupt controller
.../ +int kvm_hv_set_sint(struct kvm_kernel_irq_routing_entry *e, + struct kvm *kvm, int irq_source_id, int level, + bool line_status) +{ + return -ENOTSUP; +} + +int kvm_hv_get_sint_gsi(struct kvm_vcpu *vcpu, u32 sint) +{ + return -ENOTSUP; +} + +int kvm_hv_set_sint_gsi(struct kvm *kvm, u32 vcpu_id, u32 sint, int gsi) +{ + return -ENOTSUP; +} diff --git a/arch/s390/kvm/interrupt.c b/arch/s390/kvm/interrupt.c index 5c2c169..7fa8d9d 100644 --- a/arch/s390/kvm/interrupt.c +++ b/arch/s390/kvm/interrupt.c @@ -2285,3 +2285,21 @@ int kvm_s390_get_irq_state(struct kvm_vcpu *vcpu, __u8 __user *buf, in...
2015 Oct 26
9
[PATCH 0/7] Hyper-V Synthetic interrupt controller
Hyper-V SynIC (synthetic interrupt controller) device implementation. The implementation contains: * msr's support * irq routing setup * irq injection * irq ack callback registration * event/message pages changes tracking at Hyper-V exit * Hyper-V test device to test SynIC by kvm-unit-tests Andrey Smetanin (7): standard-headers/x86: add Hyper-V SynIC constants target-i386/kvm: Hyper-V
2015 Oct 26
9
[PATCH 0/7] Hyper-V Synthetic interrupt controller
Hyper-V SynIC (synthetic interrupt controller) device implementation. The implementation contains: * msr's support * irq routing setup * irq injection * irq ack callback registration * event/message pages changes tracking at Hyper-V exit * Hyper-V test device to test SynIC by kvm-unit-tests Andrey Smetanin (7): standard-headers/x86: add Hyper-V SynIC constants target-i386/kvm: Hyper-V
2011 Sep 08
5
[PATCH 0 of 2] v2: memshare/xenpaging/xen-access fixes for xen-unstable
The following two patches allow the parallel use of memsharing, xenpaging and xen-access by using an independent ring buffer for each feature. Please review. v2: - update mem_event_check_ring arguments, check domain rather than domain_id - check ring_full first because its value was just evaluated - check if ring buffer is initialized before calling mem_access_domctl/mem_paging_domctl
2010 Oct 26
3
[PATCH 0 of 3] credit2 updates
Address some credit2 issues. This patch series, along with the recent changes to the cpupools interface, should address some of the strange credit2 instability. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2007 Dec 20
5
[PATCH 0/16] lguest: introduce vcpu structure
this patch makes room for the vcpu structure in lguest, already used in this very same way at lguest64. It's the first part of our plan to have lguest and lguest64 unified too. When two dogs hang out, you don't have new puppies right in the other day. Some time has to be elapsed. They have to grow first. In this same spirit, having these patches _do not_ mean smp guests can be launched
2007 Dec 20
5
[PATCH 0/16] lguest: introduce vcpu structure
this patch makes room for the vcpu structure in lguest, already used in this very same way at lguest64. It's the first part of our plan to have lguest and lguest64 unified too. When two dogs hang out, you don't have new puppies right in the other day. Some time has to be elapsed. They have to grow first. In this same spirit, having these patches _do not_ mean smp guests can be launched
2013 Mar 27
2
[PATCH] x86/S3: Restore broken vcpu affinity on resume (v3)
...(struct domain *d) +{ + struct vcpu *v; + + for_each_vcpu ( d, v ) + { + vcpu_schedule_lock_irq(v); + + if (v->affinity_broken) + { + printk("Restoring vcpu affinity for domain %d vcpu %d\n", + v->domain->domain_id, v->vcpu_id); + cpumask_copy(v->cpu_affinity, v->cpu_affinity_saved); + v->affinity_broken = 0; + } + + if ( v->processor == smp_processor_id() ) + { + set_bit(_VPF_migrating, &v->pause_flags); + vcpu_schedule_unlock_irq(v); +...
2015 Oct 09
5
[PATCH 0/2] Hyper-V synthetic interrupt controller
This patchset implements the KVM part of the synthetic interrupt controller (synic) which is a building block of the Hyper-V paravirtualized device bus (vmbus). Synic is a lapic extension, which is controlled via MSRs and maintains for each vCPU - 16 synthetic interrupt "lines" (SINT's); each can be configured to trigger a specific interrupt vector optionally with auto-EOI
2015 Oct 09
5
[PATCH 0/2] Hyper-V synthetic interrupt controller
This patchset implements the KVM part of the synthetic interrupt controller (synic) which is a building block of the Hyper-V paravirtualized device bus (vmbus). Synic is a lapic extension, which is controlled via MSRs and maintains for each vCPU - 16 synthetic interrupt "lines" (SINT's); each can be configured to trigger a specific interrupt vector optionally with auto-EOI
2020 Feb 07
0
[RFC PATCH v7 52/78] KVM: introspection: add KVMI_EVENT_PAUSE_VCPU
...86_64/kvmi_test.c @@ -33,6 +33,12 @@ static vm_paddr_t test_gpa; static uint8_t test_write_pattern; static int page_size; +struct vcpu_reply { + struct kvmi_msg_hdr hdr; + struct kvmi_vcpu_hdr vcpu_hdr; + struct kvmi_event_reply reply; +}; + struct vcpu_worker_data { struct kvm_vm *vm; int vcpu_id; @@ -550,7 +556,7 @@ static void *vcpu_worker(void *data) run = vcpu_state(ctx->vm, ctx->vcpu_id); - while (!ctx->stop) { + while (!READ_ONCE(ctx->stop)) { struct ucall uc; vcpu_run(ctx->vm, ctx->vcpu_id); @@ -589,7 +595,7 @@ static void wait_vcpu_worker(pthread_t vc...
2007 Jan 19
0
[PATCH 4/4] HVM save/restore clean up: enable 64 guest on 64 HV
...h/x86/mm/shadow/common.c Fri Jan 19 19:42:42 2007 +0800 @@ -2575,8 +2575,6 @@ static void sh_update_paging_modes(struc "this HVM vcpu''s (d=%u v=%u) paging mode!\n", current->domain->domain_id, current->vcpu_id, v->domain->domain_id, v->vcpu_id); - domain_crash(v->domain); - return; } old_mfn = pagetable_get_mfn(v->arch.monitor_table); @@ -2590,7 +2588,8 @@ static void sh_update_pagi...
2008 Dec 10
0
[PATCH] Initialize state_entry_time to zero for all idle vcpus
...m to show a big idle time gap between BSP and other APs. Signed-off-by Kevin Tian <kevin.tian@intel.com> diff -r bf41be7bddea xen/common/domain.c --- a/xen/common/domain.c Mon Dec 01 14:46:11 2008 -0500 +++ b/xen/common/domain.c Tue Dec 09 20:56:23 2008 -0500 @@ -135,7 +135,8 @@ v->vcpu_id = vcpu_id; v->runstate.state = is_idle_vcpu(v) ? RUNSTATE_running : RUNSTATE_offline; - v->runstate.state_entry_time = NOW(); + /* Don''t use NOW() before xen time sub-system is intialized */ + v->runstate.state_entry_time = is_idle_vcpu(v) ? 0 : NOW(); spin_...
2020 Feb 07
0
[RFC PATCH v7 64/78] KVM: introspection: add KVMI_EVENT_XSETBV
..._NUM_EVENTS }; diff --git a/tools/testing/selftests/kvm/x86_64/kvmi_test.c b/tools/testing/selftests/kvm/x86_64/kvmi_test.c index 2852e6894e81..299f4d29d0d6 100644 --- a/tools/testing/selftests/kvm/x86_64/kvmi_test.c +++ b/tools/testing/selftests/kvm/x86_64/kvmi_test.c @@ -21,6 +21,8 @@ #define VCPU_ID 5 +#define X86_FEATURE_XSAVE (1<<26) + static int socket_pair[2]; #define Kvm_socket socket_pair[0] #define Userspace_socket socket_pair[1] @@ -53,6 +55,7 @@ enum { GUEST_TEST_BP, GUEST_TEST_CR, GUEST_TEST_HYPERCALL, + GUEST_TEST_XSETBV, }; #define GUEST_REQUEST_T...
2006 Oct 04
0
[PATCH,RFC 6/17] 32-on-64 shared info handling
...ain.c =================================================================== --- 2006-10-04.orig/xen/common/domain.c 2006-10-04 08:49:30.000000000 +0200 +++ 2006-10-04/xen/common/domain.c 2006-10-04 15:14:26.000000000 +0200 @@ -82,7 +82,7 @@ struct vcpu *alloc_vcpu( v->domain = d; v->vcpu_id = vcpu_id; - v->vcpu_info = &d->shared_info->vcpu_info[vcpu_id]; + v->vcpu_info = shared_info_addr(d, vcpu_info[vcpu_id]); spin_lock_init(&v->pause_lock); v->runstate.state = is_idle_vcpu(v) ? RUNSTATE_running : RUNSTATE_offline; Index: 2006-10-04/xen/com...
2020 Jul 21
0
[PATCH v9 68/84] KVM: introspection: add KVMI_EVENT_XSETBV
..._NUM_EVENTS }; diff --git a/tools/testing/selftests/kvm/x86_64/kvmi_test.c b/tools/testing/selftests/kvm/x86_64/kvmi_test.c index 105adf75a68d..0569185a7064 100644 --- a/tools/testing/selftests/kvm/x86_64/kvmi_test.c +++ b/tools/testing/selftests/kvm/x86_64/kvmi_test.c @@ -22,6 +22,8 @@ #define VCPU_ID 5 +#define X86_FEATURE_XSAVE (1<<26) + static int socket_pair[2]; #define Kvm_socket socket_pair[0] #define Userspace_socket socket_pair[1] @@ -54,6 +56,7 @@ enum { GUEST_TEST_BP, GUEST_TEST_CR, GUEST_TEST_HYPERCALL, + GUEST_TEST_XSETBV, }; #define GUEST_REQUEST_T...