Displaying 20 results from an estimated 178 matches for "vcpu_info".
2006 Oct 04
0
[PATCH,RFC 6/17] 32-on-64 shared info handling
...2006-10-04/xen/arch/x86/domain.c 2006-10-04 15:11:03.000000000 +0200
@@ -550,10 +550,10 @@ static void load_segments(struct vcpu *n
/* CS longword also contains full evtchn_upcall_mask. */
cs_and_mask = (unsigned short)regs->cs |
- ((unsigned int)n->vcpu_info->evtchn_upcall_mask << 16);
+ ((unsigned int)vcpu_info(n, evtchn_upcall_mask) << 16);
/* Fold upcall mask into RFLAGS.IF. */
eflags = regs->_eflags & ~X86_EFLAGS_IF;
- eflags |= !n->vcpu_info->evtchn_upcall_mask <&l...
2005 Aug 11
7
code question?
...ng the flooded toilets and such) work
today. I have come across this line of code that really I''m not sure
what the intent was..in xen/include/sched.h
#define hypercall_preempt_check() (unlikely( \
softirq_pending(smp_processor_id()) | \
(!!current->vcpu_info->evtchn_upcall_pending & \
!current->vcpu_info->evtchn_upcall_mask) \
))
the part where we have !!current->vcpu_info_evtchen_upcall pending
should this be..should the "!! just be "!"?
And if so shouldn''t this just be changed to
#define...
2010 Nov 16
4
problem after migration
...here.
I have a domU ( Redhat 6) running in Paravirt mode. When I migrate
this domU to another host, looks like the domU is freezing in the
other host. When I take it back to original host ,it starts to run
normally and this is what can see in dmesg of domU :
suspending xenstore...
trying to map vcpu_info 0 at ffff88000434b020, mfn b67660, offset 32
cpu 0 using vcpu_info at ffff88000434b020
suspending xenstore...
trying to map vcpu_info 0 at ffff88000434b020, mfn e278ee, offset 32
cpu 0 using vcpu_info at ffff88000434b020
domU is redhat 6.0
dom0 is redhat 5.5
I don''t have any issue with...
2006 Feb 24
2
[PATCH][discuss] evtchn race condition
...6
+++ b/xen/arch/x86/hvm/io.c Fri Feb 24 13:38:39 2006
@@ -720,10 +720,8 @@
* Re-set the selector and master flags in case any other
notifications
* are pending.
*/
- if ( d->shared_info->evtchn_pending[port/BITS_PER_LONG] )
- set_bit(port/BITS_PER_LONG, &v->vcpu_info->evtchn_pending_sel);
- if ( v->vcpu_info->evtchn_pending_sel )
- v->vcpu_info->evtchn_upcall_pending = 1;
+ set_bit(port/BITS_PER_LONG, &v->vcpu_info->evtchn_pending_sel);
+ v->vcpu_info->evtchn_upcall_pending = 1;
}
void hvm_safe_block(void)
@@ -...
2010 Nov 16
0
Bug#603713: xen-hypervisor-4.0-amd64: amd64 Dom0-Kernel crashes in early boot-stage
...2880 alloc=30*4096
[ 0.000000] pcpu-alloc: [0] 00 [0] 01 [0] 02 [0] 03 [0] 04 [0] 05 [0] 06 [0] 07
[ 0.000000] pcpu-alloc: [0] 08 [0] 09 [0] 10 [0] 11 [0] 12 [0] 13 [0] 14 [0] 15
[ 0.000000] pcpu-alloc: [0] 16 [0] 17 [0] 18 [0] 19 [0] 20 [0] 21 [0] 22 [0] 23
[ 35.032338] trying to map vcpu_info 0 at ffff880003477020, mfn 1803477, offset 32
[ 35.039779] cpu 0 using vcpu_info at ffff880003477020
[ 35.044806] trying to map vcpu_info 1 at ffff880003495020, mfn 1803495, offset 32
[ 35.052259] cpu 1 using vcpu_info at ffff880003495020
[ 35.057286] trying to map vcpu_info 2 at ffff880003...
2010 Dec 16
19
Hypervisor hangs on startup
Hi!
We have a problem that the dom0 very often does not boot and hangs in
the hypervisor - see screenshot. The last message is:
(XEN) Dom0 has maximum 16 VCPUs
(afterwards xen should overwrite the memory)
We are using the xen kernel from kernel.org git.
Kernel is 2.6.32.24-xen with Xen 4.0.1
Hardware is HP DL380.
Is this a known problem? Any hints what could be the problem and how we
can
2010 Dec 16
19
Hypervisor hangs on startup
Hi!
We have a problem that the dom0 very often does not boot and hangs in
the hypervisor - see screenshot. The last message is:
(XEN) Dom0 has maximum 16 VCPUs
(afterwards xen should overwrite the memory)
We are using the xen kernel from kernel.org git.
Kernel is 2.6.32.24-xen with Xen 4.0.1
Hardware is HP DL380.
Is this a known problem? Any hints what could be the problem and how we
can
2013 Jun 04
13
[PATCH] x86/vtsc: update vcpu_time after hvm_set_guest_time
...alculate the
tsc_timestamp, so after updating stime_offset we need to propagate the
change to vcpu_time in order for the guest to get the right time if
using the PV clock.
This was not done correctly, since in context_switch
update_vcpu_system_time was called before vmx_do_resume, which caused
the vcpu_info time structure to be updated with the wrong values. This
patch fixes this by calling update_vcpu_system_time after the call to
hvm_set_guest_time has happened.
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Cc: Keir Fraser <keir@xen.org>
Cc: Jan Beulich <jbeulich@suse.com>...
2007 Nov 02
0
[PATCH] PVWin: Fix warnings
..._res;
__asm {
diff -r b26bdba50c41 xenpci/evtchn.c
--- a/xenpci/evtchn.c Thu Nov 01 16:21:24 2007 -0700
+++ b/xenpci/evtchn.c Fri Nov 02 09:52:30 2007 -0700
@@ -35,7 +35,6 @@ BOOLEAN
BOOLEAN
EvtChn_InterruptDpc(WDFINTERRUPT Interrupt, WDFOBJECT AssociatedObject)
{
- int i;
int cpu = 0;
vcpu_info_t *vcpu_info;
unsigned long evt_words, evt_word;
@@ -50,7 +49,7 @@ EvtChn_InterruptDpc(WDFINTERRUPT Interru
vcpu_info = &shared_info_area->vcpu_info[cpu];
- evt_words = _InterlockedExchange(&vcpu_info->evtchn_pending_sel, 0);
+ evt_words = _InterlockedExchange((volatile LONG...
2007 Nov 15
0
[patch 13/19] xen: fix incorrect vcpu_register_vcpu_info hypercall argument
-stable review patch. If anyone has any objections, please let us know.
------------------
From: Jeremy Fitzhardinge <jeremy@goop.org>
patch e3d2697669abbe26c08dc9b95e2a71c634d096ed in mainline.
The kernel's copy of struct vcpu_register_vcpu_info was out of date,
at best causing the hypercall to fail and the guest kernel to fall
back to the old mechanism, or worse, causing random memory corruption.
Signed-off-by: Jeremy Fitzhardinge <jeremy@xensource.com>
Cc: Stable Kernel <stable@kernel.org>
Cc: Morten =?utf-8?q?B=C3=B8geskov?...
2007 Nov 15
0
[patch 13/19] xen: fix incorrect vcpu_register_vcpu_info hypercall argument
-stable review patch. If anyone has any objections, please let us know.
------------------
From: Jeremy Fitzhardinge <jeremy@goop.org>
patch e3d2697669abbe26c08dc9b95e2a71c634d096ed in mainline.
The kernel's copy of struct vcpu_register_vcpu_info was out of date,
at best causing the hypercall to fail and the guest kernel to fall
back to the old mechanism, or worse, causing random memory corruption.
Signed-off-by: Jeremy Fitzhardinge <jeremy@xensource.com>
Cc: Stable Kernel <stable@kernel.org>
Cc: Morten =?utf-8?q?B=C3=B8geskov?...
2012 Sep 07
2
[PATCH] x86/hvm: don't give vector callback higher priority than NMI/MCE
...--- a/xen/arch/x86/hvm/irq.c
+++ b/xen/arch/x86/hvm/irq.c
@@ -395,16 +395,16 @@ struct hvm_intack hvm_vcpu_has_pending_i
struct hvm_domain *plat = &v->domain->arch.hvm_domain;
int vector;
- if ( (plat->irq.callback_via_type == HVMIRQ_callback_vector)
- && vcpu_info(v, evtchn_upcall_pending) )
- return hvm_intack_vector(plat->irq.callback_via.vector);
-
if ( unlikely(v->nmi_pending) )
return hvm_intack_nmi;
if ( unlikely(v->mce_pending) )
return hvm_intack_mce;
+ if ( (plat->irq.callback_via_type == HVMIRQ_...
2011 Nov 23
2
[patch] Initialize xen_vcpu0 before initialize irq_ops
...arch/x86/xen/enlighten.c b/arch/x86/xen/enlighten.c
index 2d69617..a8111a0 100644
--- a/arch/x86/xen/enlighten.c
+++ b/arch/x86/xen/enlighten.c
@@ -1166,6 +1166,10 @@ asmlinkage void __init xen_start_kernel(void)
*/
xen_setup_stackprotector();
+ /* Don''t do the full vcpu_info placement stuff until we have a
+ possible map and a non-dummy shared_info. */
+ per_cpu(xen_vcpu, 0) = &HYPERVISOR_shared_info->vcpu_info[0];
+
xen_init_irq_ops();
xen_init_cpuid_mask();
@@ -1207,9 +1211,6 @@ asmlinkage void __init xen_start_kernel(void)...
2005 Mar 24
0
[patch] small accounting and lockup fix for xenfreebsd on -unstable
...reebsd-5.3-xen-sparse/i386-xen/i386-xen/evtchn.c 2005-03-24
13:19:58 -08:00
@@ -54,16 +54,16 @@
{
unsigned long l1, l2;
unsigned int l1i, l2i, port;
- int irq;
+ int irq, owned;
unsigned long flags;
shared_info_t *s = HYPERVISOR_shared_info;
vcpu_info_t *vcpu_info = &s->vcpu_data[smp_processor_id()];
local_irq_save(flags);
- while ( s->vcpu_data[0].evtchn_upcall_pending )
+ while ( vcpu_info->evtchn_upcall_pending )
{
- s->vcpu_data[0].evtchn_upcall_pending = 0;
+ vcpu_info->evtchn_upcall_pe...
2012 May 04
3
[BUG 2.6.32.y] Broken PV migration between hosts with different uptime, non-monotonic time?
...hile-loop dumping /proc/uptime
freezes and continues without a jump after the freeze is over.
When looking at the output of dmesg of the domU, I also see a jump in the
timestamp:
[1967742.320218] eth0: no IPv6 routers present
[1968779.217256] suspending xenstore...
[1968779.217358] trying to map vcpu_info 0 at ffff88000bcbc020, mfn
85e61e, offset 32
[1968779.217358] cpu 0 using vcpu_info at ffff88000bcbc020
[ 5655.842391] suspending xenstore...
[ 5655.842477] trying to map vcpu_info 0 at ffff88000bcbc020, mfn
d5e61e, offset 32
[ 5655.842477] cpu 0 using vcpu_info at ffff88000bcbc020
[ 7745.941585] s...
2013 Mar 21
27
[PATCH 0/4] xen/arm: guest SMP support
...small patch series implement guest SMP support for ARM, using the
ARM PSCI interface for secondary cpu bringup.
Stefano Stabellini (4):
xen/arm: basic PSCI support, implement cpu_on
xen/arm: support for guest SGI
xen/arm: support vcpu_op hypercalls
xen: move VCPUOP_register_vcpu_info to common code
xen/arch/arm/domain.c | 66 ++++++++++++++++++++++++
xen/arch/arm/mm.c | 10 ++++
xen/arch/arm/traps.c | 42 ++++++++++++++++
xen/arch/arm/vgic.c | 53 ++++++++++++++++++--
xen/arch/x86/domain.c | 113 ------------------------------...
2007 Nov 15
0
[patch 12/19] xen: deal with stale cr3 values when unpinning pagetables
...---
arch/i386/xen/mmu.c | 29 +++++++++++++++++++++---
arch/i386/xen/xen-ops.h | 1
3 files changed, 65 insertions(+), 20 deletions(-)
--- a/arch/i386/xen/enlighten.c
+++ b/arch/i386/xen/enlighten.c
@@ -56,7 +56,23 @@ DEFINE_PER_CPU(enum paravirt_lazy_mode,
DEFINE_PER_CPU(struct vcpu_info *, xen_vcpu);
DEFINE_PER_CPU(struct vcpu_info, xen_vcpu_info);
-DEFINE_PER_CPU(unsigned long, xen_cr3);
+
+/*
+ * Note about cr3 (pagetable base) values:
+ *
+ * xen_cr3 contains the current logical cr3 value; it contains the
+ * last set cr3. This may not be the current effective cr3, because
+...
2007 Nov 15
0
[patch 12/19] xen: deal with stale cr3 values when unpinning pagetables
...---
arch/i386/xen/mmu.c | 29 +++++++++++++++++++++---
arch/i386/xen/xen-ops.h | 1
3 files changed, 65 insertions(+), 20 deletions(-)
--- a/arch/i386/xen/enlighten.c
+++ b/arch/i386/xen/enlighten.c
@@ -56,7 +56,23 @@ DEFINE_PER_CPU(enum paravirt_lazy_mode,
DEFINE_PER_CPU(struct vcpu_info *, xen_vcpu);
DEFINE_PER_CPU(struct vcpu_info, xen_vcpu_info);
-DEFINE_PER_CPU(unsigned long, xen_cr3);
+
+/*
+ * Note about cr3 (pagetable base) values:
+ *
+ * xen_cr3 contains the current logical cr3 value; it contains the
+ * last set cr3. This may not be the current effective cr3, because
+...
2007 Oct 12
10
[PATCH 00/10] REVIEW: Xen patches for 2.6.24
...clean up some duplicate includes
- when sending an IPI, yield the vcpu if the destination doesn't have
a real cpu to run on
- fix a bug where a lazy cr3 reload can prevent a pagetable from being
unpinned
- deal with split pte locks properly
- fix an old structure used for the register_vcpu_info hypercall
- add some multicall debugging help
- workaround for a bad XFS/Xen interaction
Thanks,
J
--
2007 Oct 12
10
[PATCH 00/10] REVIEW: Xen patches for 2.6.24
...clean up some duplicate includes
- when sending an IPI, yield the vcpu if the destination doesn't have
a real cpu to run on
- fix a bug where a lazy cr3 reload can prevent a pagetable from being
unpinned
- deal with split pte locks properly
- fix an old structure used for the register_vcpu_info hypercall
- add some multicall debugging help
- workaround for a bad XFS/Xen interaction
Thanks,
J
--