search for: vcpu_info

Displaying 20 results from an estimated 178 matches for "vcpu_info".

2006 Oct 04
0
[PATCH,RFC 6/17] 32-on-64 shared info handling
...2006-10-04/xen/arch/x86/domain.c 2006-10-04 15:11:03.000000000 +0200 @@ -550,10 +550,10 @@ static void load_segments(struct vcpu *n /* CS longword also contains full evtchn_upcall_mask. */ cs_and_mask = (unsigned short)regs->cs | - ((unsigned int)n->vcpu_info->evtchn_upcall_mask << 16); + ((unsigned int)vcpu_info(n, evtchn_upcall_mask) << 16); /* Fold upcall mask into RFLAGS.IF. */ eflags = regs->_eflags & ~X86_EFLAGS_IF; - eflags |= !n->vcpu_info->evtchn_upcall_mask <&l...
2005 Aug 11
7
code question?
...ng the flooded toilets and such) work today. I have come across this line of code that really I''m not sure what the intent was..in xen/include/sched.h #define hypercall_preempt_check() (unlikely( \ softirq_pending(smp_processor_id()) | \ (!!current->vcpu_info->evtchn_upcall_pending & \ !current->vcpu_info->evtchn_upcall_mask) \ )) the part where we have !!current->vcpu_info_evtchen_upcall pending should this be..should the "!! just be "!"? And if so shouldn''t this just be changed to #define...
2010 Nov 16
4
problem after migration
...here. I have a domU ( Redhat 6) running in Paravirt mode. When I migrate this domU to another host, looks like the domU is freezing in the other host. When I take it back to original host ,it starts to run normally and this is what can see in dmesg of domU : suspending xenstore... trying to map vcpu_info 0 at ffff88000434b020, mfn b67660, offset 32 cpu 0 using vcpu_info at ffff88000434b020 suspending xenstore... trying to map vcpu_info 0 at ffff88000434b020, mfn e278ee, offset 32 cpu 0 using vcpu_info at ffff88000434b020 domU is redhat 6.0 dom0 is redhat 5.5 I don''t have any issue with...
2006 Feb 24
2
[PATCH][discuss] evtchn race condition
...6 +++ b/xen/arch/x86/hvm/io.c Fri Feb 24 13:38:39 2006 @@ -720,10 +720,8 @@ * Re-set the selector and master flags in case any other notifications * are pending. */ - if ( d->shared_info->evtchn_pending[port/BITS_PER_LONG] ) - set_bit(port/BITS_PER_LONG, &v->vcpu_info->evtchn_pending_sel); - if ( v->vcpu_info->evtchn_pending_sel ) - v->vcpu_info->evtchn_upcall_pending = 1; + set_bit(port/BITS_PER_LONG, &v->vcpu_info->evtchn_pending_sel); + v->vcpu_info->evtchn_upcall_pending = 1; } void hvm_safe_block(void) @@ -...
2010 Nov 16
0
Bug#603713: xen-hypervisor-4.0-amd64: amd64 Dom0-Kernel crashes in early boot-stage
...2880 alloc=30*4096 [ 0.000000] pcpu-alloc: [0] 00 [0] 01 [0] 02 [0] 03 [0] 04 [0] 05 [0] 06 [0] 07 [ 0.000000] pcpu-alloc: [0] 08 [0] 09 [0] 10 [0] 11 [0] 12 [0] 13 [0] 14 [0] 15 [ 0.000000] pcpu-alloc: [0] 16 [0] 17 [0] 18 [0] 19 [0] 20 [0] 21 [0] 22 [0] 23 [ 35.032338] trying to map vcpu_info 0 at ffff880003477020, mfn 1803477, offset 32 [ 35.039779] cpu 0 using vcpu_info at ffff880003477020 [ 35.044806] trying to map vcpu_info 1 at ffff880003495020, mfn 1803495, offset 32 [ 35.052259] cpu 1 using vcpu_info at ffff880003495020 [ 35.057286] trying to map vcpu_info 2 at ffff880003...
2010 Dec 16
19
Hypervisor hangs on startup
Hi! We have a problem that the dom0 very often does not boot and hangs in the hypervisor - see screenshot. The last message is: (XEN) Dom0 has maximum 16 VCPUs (afterwards xen should overwrite the memory) We are using the xen kernel from kernel.org git. Kernel is 2.6.32.24-xen with Xen 4.0.1 Hardware is HP DL380. Is this a known problem? Any hints what could be the problem and how we can
2010 Dec 16
19
Hypervisor hangs on startup
Hi! We have a problem that the dom0 very often does not boot and hangs in the hypervisor - see screenshot. The last message is: (XEN) Dom0 has maximum 16 VCPUs (afterwards xen should overwrite the memory) We are using the xen kernel from kernel.org git. Kernel is 2.6.32.24-xen with Xen 4.0.1 Hardware is HP DL380. Is this a known problem? Any hints what could be the problem and how we can
2013 Jun 04
13
[PATCH] x86/vtsc: update vcpu_time after hvm_set_guest_time
...alculate the tsc_timestamp, so after updating stime_offset we need to propagate the change to vcpu_time in order for the guest to get the right time if using the PV clock. This was not done correctly, since in context_switch update_vcpu_system_time was called before vmx_do_resume, which caused the vcpu_info time structure to be updated with the wrong values. This patch fixes this by calling update_vcpu_system_time after the call to hvm_set_guest_time has happened. Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Cc: Keir Fraser <keir@xen.org> Cc: Jan Beulich <jbeulich@suse.com>...
2007 Nov 02
0
[PATCH] PVWin: Fix warnings
..._res; __asm { diff -r b26bdba50c41 xenpci/evtchn.c --- a/xenpci/evtchn.c Thu Nov 01 16:21:24 2007 -0700 +++ b/xenpci/evtchn.c Fri Nov 02 09:52:30 2007 -0700 @@ -35,7 +35,6 @@ BOOLEAN BOOLEAN EvtChn_InterruptDpc(WDFINTERRUPT Interrupt, WDFOBJECT AssociatedObject) { - int i; int cpu = 0; vcpu_info_t *vcpu_info; unsigned long evt_words, evt_word; @@ -50,7 +49,7 @@ EvtChn_InterruptDpc(WDFINTERRUPT Interru vcpu_info = &shared_info_area->vcpu_info[cpu]; - evt_words = _InterlockedExchange(&vcpu_info->evtchn_pending_sel, 0); + evt_words = _InterlockedExchange((volatile LONG...
2007 Nov 15
0
[patch 13/19] xen: fix incorrect vcpu_register_vcpu_info hypercall argument
-stable review patch. If anyone has any objections, please let us know. ------------------ From: Jeremy Fitzhardinge <jeremy@goop.org> patch e3d2697669abbe26c08dc9b95e2a71c634d096ed in mainline. The kernel's copy of struct vcpu_register_vcpu_info was out of date, at best causing the hypercall to fail and the guest kernel to fall back to the old mechanism, or worse, causing random memory corruption. Signed-off-by: Jeremy Fitzhardinge <jeremy@xensource.com> Cc: Stable Kernel <stable@kernel.org> Cc: Morten =?utf-8?q?B=C3=B8geskov?...
2007 Nov 15
0
[patch 13/19] xen: fix incorrect vcpu_register_vcpu_info hypercall argument
-stable review patch. If anyone has any objections, please let us know. ------------------ From: Jeremy Fitzhardinge <jeremy@goop.org> patch e3d2697669abbe26c08dc9b95e2a71c634d096ed in mainline. The kernel's copy of struct vcpu_register_vcpu_info was out of date, at best causing the hypercall to fail and the guest kernel to fall back to the old mechanism, or worse, causing random memory corruption. Signed-off-by: Jeremy Fitzhardinge <jeremy@xensource.com> Cc: Stable Kernel <stable@kernel.org> Cc: Morten =?utf-8?q?B=C3=B8geskov?...
2012 Sep 07
2
[PATCH] x86/hvm: don't give vector callback higher priority than NMI/MCE
...--- a/xen/arch/x86/hvm/irq.c +++ b/xen/arch/x86/hvm/irq.c @@ -395,16 +395,16 @@ struct hvm_intack hvm_vcpu_has_pending_i struct hvm_domain *plat = &v->domain->arch.hvm_domain; int vector; - if ( (plat->irq.callback_via_type == HVMIRQ_callback_vector) - && vcpu_info(v, evtchn_upcall_pending) ) - return hvm_intack_vector(plat->irq.callback_via.vector); - if ( unlikely(v->nmi_pending) ) return hvm_intack_nmi; if ( unlikely(v->mce_pending) ) return hvm_intack_mce; + if ( (plat->irq.callback_via_type == HVMIRQ_...
2011 Nov 23
2
[patch] Initialize xen_vcpu0 before initialize irq_ops
...arch/x86/xen/enlighten.c b/arch/x86/xen/enlighten.c index 2d69617..a8111a0 100644 --- a/arch/x86/xen/enlighten.c +++ b/arch/x86/xen/enlighten.c @@ -1166,6 +1166,10 @@ asmlinkage void __init xen_start_kernel(void) */ xen_setup_stackprotector(); + /* Don''t do the full vcpu_info placement stuff until we have a + possible map and a non-dummy shared_info. */ + per_cpu(xen_vcpu, 0) = &HYPERVISOR_shared_info->vcpu_info[0]; + xen_init_irq_ops(); xen_init_cpuid_mask(); @@ -1207,9 +1211,6 @@ asmlinkage void __init xen_start_kernel(void)...
2005 Mar 24
0
[patch] small accounting and lockup fix for xenfreebsd on -unstable
...reebsd-5.3-xen-sparse/i386-xen/i386-xen/evtchn.c 2005-03-24 13:19:58 -08:00 @@ -54,16 +54,16 @@ { unsigned long l1, l2; unsigned int l1i, l2i, port; - int irq; + int irq, owned; unsigned long flags; shared_info_t *s = HYPERVISOR_shared_info; vcpu_info_t *vcpu_info = &s->vcpu_data[smp_processor_id()]; local_irq_save(flags); - while ( s->vcpu_data[0].evtchn_upcall_pending ) + while ( vcpu_info->evtchn_upcall_pending ) { - s->vcpu_data[0].evtchn_upcall_pending = 0; + vcpu_info->evtchn_upcall_pe...
2012 May 04
3
[BUG 2.6.32.y] Broken PV migration between hosts with different uptime, non-monotonic time?
...hile-loop dumping /proc/uptime freezes and continues without a jump after the freeze is over. When looking at the output of dmesg of the domU, I also see a jump in the timestamp: [1967742.320218] eth0: no IPv6 routers present [1968779.217256] suspending xenstore... [1968779.217358] trying to map vcpu_info 0 at ffff88000bcbc020, mfn 85e61e, offset 32 [1968779.217358] cpu 0 using vcpu_info at ffff88000bcbc020 [ 5655.842391] suspending xenstore... [ 5655.842477] trying to map vcpu_info 0 at ffff88000bcbc020, mfn d5e61e, offset 32 [ 5655.842477] cpu 0 using vcpu_info at ffff88000bcbc020 [ 7745.941585] s...
2013 Mar 21
27
[PATCH 0/4] xen/arm: guest SMP support
...small patch series implement guest SMP support for ARM, using the ARM PSCI interface for secondary cpu bringup. Stefano Stabellini (4): xen/arm: basic PSCI support, implement cpu_on xen/arm: support for guest SGI xen/arm: support vcpu_op hypercalls xen: move VCPUOP_register_vcpu_info to common code xen/arch/arm/domain.c | 66 ++++++++++++++++++++++++ xen/arch/arm/mm.c | 10 ++++ xen/arch/arm/traps.c | 42 ++++++++++++++++ xen/arch/arm/vgic.c | 53 ++++++++++++++++++-- xen/arch/x86/domain.c | 113 ------------------------------...
2007 Nov 15
0
[patch 12/19] xen: deal with stale cr3 values when unpinning pagetables
...--- arch/i386/xen/mmu.c | 29 +++++++++++++++++++++--- arch/i386/xen/xen-ops.h | 1 3 files changed, 65 insertions(+), 20 deletions(-) --- a/arch/i386/xen/enlighten.c +++ b/arch/i386/xen/enlighten.c @@ -56,7 +56,23 @@ DEFINE_PER_CPU(enum paravirt_lazy_mode, DEFINE_PER_CPU(struct vcpu_info *, xen_vcpu); DEFINE_PER_CPU(struct vcpu_info, xen_vcpu_info); -DEFINE_PER_CPU(unsigned long, xen_cr3); + +/* + * Note about cr3 (pagetable base) values: + * + * xen_cr3 contains the current logical cr3 value; it contains the + * last set cr3. This may not be the current effective cr3, because +...
2007 Nov 15
0
[patch 12/19] xen: deal with stale cr3 values when unpinning pagetables
...--- arch/i386/xen/mmu.c | 29 +++++++++++++++++++++--- arch/i386/xen/xen-ops.h | 1 3 files changed, 65 insertions(+), 20 deletions(-) --- a/arch/i386/xen/enlighten.c +++ b/arch/i386/xen/enlighten.c @@ -56,7 +56,23 @@ DEFINE_PER_CPU(enum paravirt_lazy_mode, DEFINE_PER_CPU(struct vcpu_info *, xen_vcpu); DEFINE_PER_CPU(struct vcpu_info, xen_vcpu_info); -DEFINE_PER_CPU(unsigned long, xen_cr3); + +/* + * Note about cr3 (pagetable base) values: + * + * xen_cr3 contains the current logical cr3 value; it contains the + * last set cr3. This may not be the current effective cr3, because +...
2007 Oct 12
10
[PATCH 00/10] REVIEW: Xen patches for 2.6.24
...clean up some duplicate includes - when sending an IPI, yield the vcpu if the destination doesn't have a real cpu to run on - fix a bug where a lazy cr3 reload can prevent a pagetable from being unpinned - deal with split pte locks properly - fix an old structure used for the register_vcpu_info hypercall - add some multicall debugging help - workaround for a bad XFS/Xen interaction Thanks, J --
2007 Oct 12
10
[PATCH 00/10] REVIEW: Xen patches for 2.6.24
...clean up some duplicate includes - when sending an IPI, yield the vcpu if the destination doesn't have a real cpu to run on - fix a bug where a lazy cr3 reload can prevent a pagetable from being unpinned - deal with split pte locks properly - fix an old structure used for the register_vcpu_info hypercall - add some multicall debugging help - workaround for a bad XFS/Xen interaction Thanks, J --