search for: vlapic_accept_irq

Displaying 4 results from an estimated 4 matches for "vlapic_accept_irq".

Did you mean: __apic_accept_irq
2006 May 30
2
Testing status of fully virtualized guests (Intel VT) on 64bit XEN unstable
...CPU guest hangs under load: "ata1: command 0x25 timeout, stat 0x50 host_stat 0x64" 5. 64bit SMP guest report these messages while running: "(XEN) spurious IRQ irq got=-1" 6. 64bit SMP guest report these messages during ltp pth_str01/2/3: : "(XEN) <vlapic_accept_irq>level trig mode repeatedly for vector 252" 7. 32bit SMP guest crashes on boot: "(XEN) __hvm_bug at vmx.c:2289" _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2006 Jun 26
0
[PATCH - proposed] XI Shadow Page Table Mechanism
...ot; 2. BUG 666: 32bit UP guest fail ltp gettimeofday02: "Time is going backwards" 3. BUG 663: 64bit SMP guest report these messages while running: "(XEN) spurious IRQ irq got=-1" 4. BUG 662: 64bit SMP guest report this message in ltp pth_str01/2/3: "(XEN) <vlapic_accept_irq>level trig mode repeatedly for vector 252" 5. BUG 678: 64bit 2CPU SMP guest failed several ltp tests with SEGVs or GPF "sshd[23654] general protection rip:2a9555d426 rsp:7fbfffd000 error 0" The XI patch can be enabled or disabled at build time and includes some performance s...
2006 Jun 30
5
[PATCH - proposed] XI Shadow Page Table Mechanism]
...gt;>>>>> 3. BUG 663: 64bit SMP guest report these messages while running: >>>>>> "(XEN) spurious IRQ irq got=-1" >>>>>> 4. BUG 662: 64bit SMP guest report this message in ltp pth_str01/2/3: >>>>>> "(XEN) <vlapic_accept_irq>level trig mode repeatedly for >>>>>> vector 252" >>>>>> 5. BUG 678: 64bit 2CPU SMP guest failed several ltp tests with >>>>>> SEGVs or GPF >>>>>> "sshd[23654] general protection rip:2a9555d426 rsp:7fbfffd000...
2013 Apr 09
39
[PATCH 0/4] Add posted interrupt supporting
From: Yang Zhang <yang.z.zhang@Intel.com> The follwoing patches are adding the Posted Interrupt supporting to Xen: Posted Interrupt allows vAPIC interrupts to inject into guest directly without any vmexit. - When delivering a interrupt to guest, if target vcpu is running, update Posted-interrupt requests bitmap and send a notification event to the vcpu. Then the vcpu will handle this