Displaying 4 results from an estimated 4 matches for "vlapic_accept_irq".
Did you mean:
__apic_accept_irq
2006 May 30
2
Testing status of fully virtualized guests (Intel VT) on 64bit XEN unstable
...CPU guest hangs under load:
"ata1: command 0x25 timeout, stat 0x50 host_stat 0x64"
5. 64bit SMP guest report these messages while running:
"(XEN) spurious IRQ irq got=-1"
6. 64bit SMP guest report these messages during ltp pth_str01/2/3: :
"(XEN) <vlapic_accept_irq>level trig mode repeatedly for vector 252"
7. 32bit SMP guest crashes on boot:
"(XEN) __hvm_bug at vmx.c:2289"
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Jun 26
0
[PATCH - proposed] XI Shadow Page Table Mechanism
...ot;
2. BUG 666: 32bit UP guest fail ltp gettimeofday02:
"Time is going backwards"
3. BUG 663: 64bit SMP guest report these messages while running:
"(XEN) spurious IRQ irq got=-1"
4. BUG 662: 64bit SMP guest report this message in ltp pth_str01/2/3:
"(XEN) <vlapic_accept_irq>level trig mode repeatedly for vector 252"
5. BUG 678: 64bit 2CPU SMP guest failed several ltp tests with SEGVs or GPF
"sshd[23654] general protection rip:2a9555d426 rsp:7fbfffd000 error 0"
The XI patch can be enabled or disabled at build time and includes some
performance s...
2006 Jun 30
5
[PATCH - proposed] XI Shadow Page Table Mechanism]
...gt;>>>>> 3. BUG 663: 64bit SMP guest report these messages while running:
>>>>>> "(XEN) spurious IRQ irq got=-1"
>>>>>> 4. BUG 662: 64bit SMP guest report this message in ltp pth_str01/2/3:
>>>>>> "(XEN) <vlapic_accept_irq>level trig mode repeatedly for
>>>>>> vector 252"
>>>>>> 5. BUG 678: 64bit 2CPU SMP guest failed several ltp tests with
>>>>>> SEGVs or GPF
>>>>>> "sshd[23654] general protection rip:2a9555d426 rsp:7fbfffd000...
2013 Apr 09
39
[PATCH 0/4] Add posted interrupt supporting
From: Yang Zhang <yang.z.zhang@Intel.com>
The follwoing patches are adding the Posted Interrupt supporting to Xen:
Posted Interrupt allows vAPIC interrupts to inject into guest directly
without any vmexit.
- When delivering a interrupt to guest, if target vcpu is running,
update Posted-interrupt requests bitmap and send a notification event
to the vcpu. Then the vcpu will handle this