Displaying 20 results from an estimated 113 matches for "xen_evtchn_do_upcall".
2012 Oct 22
4
xen_evtchn_do_upcall
Hi,
Is anybody know the purpose of this method (xen_evtchn_do_upcall)? When I
run a user level application involved in TCP receiving and the SoftIRQ for
eth0 on the same CPU core, everything is OK. But if I run them on 2
different cores, there will be xen_evtchn_do_upcall() existing (maybe when
the local_bh_disable<http://www.cs.fsu.edu/~baker/devices/lxr/http/id...
2008 Jun 10
1
[PATCH] xen: Use wmb instead of rmb in xen_evtchn_do_upcall().
This patch is ported one from 534:77db69c38249 of linux-2.6.18-xen.hg.
Use wmb instead of rmb to enforce ordering between
evtchn_upcall_pending and evtchn_pending_sel stores
in xen_evtchn_do_upcall().
Cc: Samuel Thibault <samuel.thibault at eu.citrix.com>
Signed-off-by: Isaku Yamahata <yamahata at valinux.co.jp>
---
drivers/xen/events.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/xen/events.c b/drivers/xen/events.c
index 73d78dc..332dd63 100...
2012 Nov 06
1
[PATCH] xen/events: xen/events: fix RCU warning
...omic_notifier_chain_unregister+0x90/0x90
[ 2.514258] [<ffffffff811216cd>] ? trace_hardirqs_off+0xd/0x10
[ 2.514318] [<ffffffff810ea136>] atomic_notifier_call_chain+0x16/0x20
[ 2.514381] [<ffffffff810777c3>] exit_idle+0x43/0x50
[ 2.514441] [<ffffffff81568865>] xen_evtchn_do_upcall+0x25/0x50
[ 2.514503] [<ffffffff81aa690e>] xen_do_hypervisor_callback+0x1e/0x30
[ 2.514562] <EOI> [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
[ 2.514662] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
[ 2.514722] [<ffffffff81061540>] ? xen_s...
2012 Nov 06
1
[PATCH] xen/events: xen/events: fix RCU warning
...omic_notifier_chain_unregister+0x90/0x90
[ 2.514258] [<ffffffff811216cd>] ? trace_hardirqs_off+0xd/0x10
[ 2.514318] [<ffffffff810ea136>] atomic_notifier_call_chain+0x16/0x20
[ 2.514381] [<ffffffff810777c3>] exit_idle+0x43/0x50
[ 2.514441] [<ffffffff81568865>] xen_evtchn_do_upcall+0x25/0x50
[ 2.514503] [<ffffffff81aa690e>] xen_do_hypervisor_callback+0x1e/0x30
[ 2.514562] <EOI> [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
[ 2.514662] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000
[ 2.514722] [<ffffffff81061540>] ? xen_s...
2007 Apr 18
2
paravirt xen gpf
...current paravirt patchqueue dies with ...
Checking if this processor honours the WP bit even in supervisor mode... Ok.
general protection fault: 0000 [#1]
SMP
Modules linked in:
CPU: 0
EIP: 0061:[<c01021a8>] Not tainted VLI
EFLAGS: 00010013 (2.6.20-git8-default-hg770 #7)
EIP is at xen_evtchn_do_upcall+0x56/0x94
eax: ffffffff ebx: 00000000 ecx: fbfb9000 edx: ffff8b04
esi: 00000001 edi: fffffffe ebp: 00000000 esp: c03aff30
ds: 007b es: 007b fs: 00d8 gs: 0000 ss: e021
Process swapper (pid: 0, ti=c03ae000 task=c0377340 task.ti=c03ae000)
Stack: fbfb9000 00000000 ffff8b04 0242764c 00...
2007 Apr 18
2
paravirt xen gpf
...current paravirt patchqueue dies with ...
Checking if this processor honours the WP bit even in supervisor mode... Ok.
general protection fault: 0000 [#1]
SMP
Modules linked in:
CPU: 0
EIP: 0061:[<c01021a8>] Not tainted VLI
EFLAGS: 00010013 (2.6.20-git8-default-hg770 #7)
EIP is at xen_evtchn_do_upcall+0x56/0x94
eax: ffffffff ebx: 00000000 ecx: fbfb9000 edx: ffff8b04
esi: 00000001 edi: fffffffe ebp: 00000000 esp: c03aff30
ds: 007b es: 007b fs: 00d8 gs: 0000 ss: e021
Process swapper (pid: 0, ti=c03ae000 task=c0377340 task.ti=c03ae000)
Stack: fbfb9000 00000000 ffff8b04 0242764c 00...
2008 Apr 01
0
[PATCH 007/112] Xen: Make events.c portable for ia64/xen support.
...) && i == cpu) ? !(get_irq_regs()->flags & X86_EFLAGS_IF) : v->evtchn_upcall_mask,
+ (get_irq_regs() && i == cpu) ? xen_irqs_disabled(get_irq_regs()) : v->evtchn_upcall_mask,
v->evtchn_upcall_pending,
v->evtchn_pending_sel);
}
@@ -527,7 +527,10 @@ void xen_evtchn_do_upcall(struct pt_regs *regs)
if (__get_cpu_var(nesting_count)++)
goto out;
- /* NB. No need for a barrier here -- XCHG is a barrier on x86. */
+#ifndef CONFIG_X86 /* No need for a barrier -- XCHG is a barrier on x86. */
+ /* Clear master flag /before/ clearing selector flag. */
+ rmb();
+#endi...
2008 Apr 01
0
[PATCH 007/112] Xen: Make events.c portable for ia64/xen support.
...) && i == cpu) ? !(get_irq_regs()->flags & X86_EFLAGS_IF) : v->evtchn_upcall_mask,
+ (get_irq_regs() && i == cpu) ? xen_irqs_disabled(get_irq_regs()) : v->evtchn_upcall_mask,
v->evtchn_upcall_pending,
v->evtchn_pending_sel);
}
@@ -527,7 +527,10 @@ void xen_evtchn_do_upcall(struct pt_regs *regs)
if (__get_cpu_var(nesting_count)++)
goto out;
- /* NB. No need for a barrier here -- XCHG is a barrier on x86. */
+#ifndef CONFIG_X86 /* No need for a barrier -- XCHG is a barrier on x86. */
+ /* Clear master flag /before/ clearing selector flag. */
+ rmb();
+#endi...
2017 May 19
0
[PATCH 03/10] xen: move interrupt handling for pv guests under CONFIG_XEN_PV umbrella
...rig_ax = -1 => not a system call */
SAVE_ALL
@@ -870,7 +870,9 @@ ENTRY(xen_failsafe_callback)
_ASM_EXTABLE(3b, 8b)
_ASM_EXTABLE(4b, 9b)
ENDPROC(xen_failsafe_callback)
+#endif /* CONFIG_XEN_PV */
+#ifdef CONFIG_XEN
BUILD_INTERRUPT3(xen_hvm_callback_vector, HYPERVISOR_CALLBACK_VECTOR,
xen_evtchn_do_upcall)
diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S
index 607d72c4a485..cd47214ff402 100644
--- a/arch/x86/entry/entry_64.S
+++ b/arch/x86/entry/entry_64.S
@@ -902,7 +902,7 @@ ENTRY(do_softirq_own_stack)
ret
END(do_softirq_own_stack)
-#ifdef CONFIG_XEN
+#ifdef CONFIG_XEN_PV...
2017 Nov 09
1
Crash in network stack under Xen
..._complete+0xbb/0xd0
napi_gro_complete+0x73/0xa0
napi_gro_flush+0x5f/0x80
napi_complete_done+0x6a/0xb0
igb_poll+0x38d/0x720 [igb]
? igb_msix_ring+0x2e/0x40 [igb]
? __handle_irq_event_percpu+0x4b/0x1a0
net_rx_action+0x158/0x360
__do_softirq+0xd1/0x283
irq_exit+0xe9/0x100
xen_evtchn_do_upcall+0x35/0x50
xen_do_hypervisor_callback+0x1e/0x40
<EOI> ? xen_hypercall_sched_op+0xa/0x20
? xen_hypercall_sched_op+0xa/0x20
? xen_safe_halt+0x10/0x20
? default_idle+0x1e/0xd0
? arch_cpu_idle+0xf/0x20
? default_idle_call+0x2c/0x40
? cpu_startup_entry+0x1ac/0x240
? re...
2009 Sep 09
4
Dmesg log for 2.6.31-rc8 kernel been built on F12 (rawhide) vs log for same kernel been built on F11 and installed on F12
Previous 2.6.31-rc8 kernel was built on F11 and installed with modules on F12.
Current kernel has been built on F12 (2.6.31-0.204.rc9.fc12.x86_64) and installed
on F12 before loading under Xen 3.4.1.
Dmesg log looks similar to Michael Yuong''s ''rc7.git4'' kernel for F12.
Boris.
--- On Tue, 9/8/09, Boris Derzhavets <bderzhavets@yahoo.com> wrote:
From: Boris
2009 Mar 11
3
2.6.28.7 domU oops: invalid opcode 0000
...>] ? kick_pending_request_queues+0x18/0x24
[<ffffffff803f2f7a>] ? blkif_interrupt+0x1a0/0x1c2
[<ffffffff80248d4b>] ? handle_IRQ_event+0x2c/0x61
[<ffffffff8024a538>] ? handle_level_irq+0x5c/0xa0
[<ffffffff802114d4>] ? do_IRQ+0x57/0xb3
[<ffffffff803d2c68>] ? xen_evtchn_do_upcall+0x89/0xeb
[<ffffffff8049f22e>] ? xen_do_hypervisor_callback+0x1e/0x30
<EOI> <0>Code: 00 00 66 41 8b 46 2a 44 0f b7 e0 66 89 44 24 32 49 c1
e4 04 4d 03 66 48 c7 44 24 34 00 00 00 00 e9 f4 00 00 00 80 7d 01 0b 75
04 <0f> 0b eb fe 48 bf 00 00 00 00 00 1e 00 00 49 03 3c 24...
2010 Mar 11
1
[PATCH 1/2] xen: balloon: Fix checkpatch issues
drivers/xen/balloon.c:50: WARNING: Use #include <linux/uaccess.h> instead of <asm/uaccess.h>
drivers/xen/balloon.c:158: ERROR: else should follow close brace '}'
drivers/xen/balloon.c:277: ERROR: do not use assignment in if condition
drivers/xen/balloon.c:293: ERROR: code indent should use tabs where possible
drivers/xen/balloon.c:364: ERROR: that open brace { should be on the
2010 Mar 11
1
[PATCH 1/2] xen: balloon: Fix checkpatch issues
drivers/xen/balloon.c:50: WARNING: Use #include <linux/uaccess.h> instead of <asm/uaccess.h>
drivers/xen/balloon.c:158: ERROR: else should follow close brace '}'
drivers/xen/balloon.c:277: ERROR: do not use assignment in if condition
drivers/xen/balloon.c:293: ERROR: code indent should use tabs where possible
drivers/xen/balloon.c:364: ERROR: that open brace { should be on the
2010 Mar 11
1
[PATCH 1/2] xen: balloon: Fix checkpatch issues
drivers/xen/balloon.c:50: WARNING: Use #include <linux/uaccess.h> instead of <asm/uaccess.h>
drivers/xen/balloon.c:158: ERROR: else should follow close brace '}'
drivers/xen/balloon.c:277: ERROR: do not use assignment in if condition
drivers/xen/balloon.c:293: ERROR: code indent should use tabs where possible
drivers/xen/balloon.c:364: ERROR: that open brace { should be on the
2012 Sep 18
1
Back trace from rcutree.c after resuming from S3
...ew_grace_period.isra.35+0x38/0x44
[ 142.851512] [<ffffffff810c7101>] __rcu_process_callbacks+0xc6/0xee
[ 142.851520] [<ffffffff810c7149>] rcu_process_callbacks+0x20/0x3e
[ 142.851527] [<ffffffff81070c27>] __do_softirq+0x87/0x113
[ 142.851536] [<ffffffff812e7b22>] ? __xen_evtchn_do_upcall+0x1a0/0x1dd
[ 142.851546] [<ffffffff8162f05c>] call_softirq+0x1c/0x30
[ 142.851557] [<ffffffff810343a3>] do_softirq+0x41/0x7e
[ 142.851566] [<ffffffff81070e66>] irq_exit+0x3f/0x9a
[ 142.851573] [<ffffffff812e95c9>] xen_evtchn_do_upcall+0x2c/0x39
[ 142.851580] [<...
2016 Mar 10
2
Soft lockups with Xen4CentOS 3.18.25-18.el6.x86_64
...a0281a0d>] xenvif_tx_action+0x4d/0xa0 [xen_netback]
[<ffffffffa02843b5>] xenvif_poll+0x35/0x68 [xen_netback]
[<ffffffff815a39c2>] net_rx_action+0x112/0x2a0
[<ffffffff81076b7c>] __do_softirq+0xfc/0x2b0
[<ffffffff81076e3d>] irq_exit+0xbd/0xd0
[<ffffffff813b2cbc>] xen_evtchn_do_upcall+0x3c/0x50
[<ffffffff8167659e>] xen_do_hypervisor_callback+0x1e/0x40
<EOI>
[<ffffffff810013aa>] ? xen_hypercall_sched_op+0xa/0x20
[<ffffffff810013aa>] ? xen_hypercall_sched_op+0xa/0x20
[<ffffffff8100a830>] ? xen_safe_halt+0x10/0x20
[<ffffffff8101ec84>] ? def...
2012 Oct 03
1
PCI Passthrough of NIC
...00ecf2>] ? check_events+0x12/0x20
[ 106.816349]
[<ffffffff8100ec12>] ? xen_vcpuop_set_next_event+0x0/0x60
[ 106.816361]
[<ffffffff8105b713>] ? run_timer_softirq+0x1c9/0x268
[ 106.816372]
[<ffffffff81054dbf>] ? __do_softirq+0xdd/0x1a6
[ 106.816383]
[<ffffffff811f2b5f>] ? __xen_evtchn_do_upcall+0x245/0x28d
[ 106.816394]
[<ffffffff81012cac>] ? call_softirq+0x1c/0x30
[ 106.816404]
[<ffffffff8101422b>] ? do_softirq+0x3f/0x7c
[ 106.816414]
[<ffffffff81054c2f>] ? irq_exit+0x36/0x76
[ 106.816423]
[<ffffffff811f3350>] ? xen_evtchn_do_upcall+0x33/0x42
[ 106.816434]
[<ff...
2011 Oct 25
1
Page allocation failure
...;ffffffff81096154>] ? handle_percpu_irq+0x4e/0x6a
[488054.896258] [<ffffffff81011cac>] ? call_softirq+0x1c/0x30
[488054.896269] [<ffffffff8101322b>] ? do_softirq+0x3f/0x7c
[488054.896280] [<ffffffff81053b1b>] ? irq_exit+0x36/0x76
[488054.896291] [<ffffffff811ef48c>] ? xen_evtchn_do_upcall+0x33/0x41
[488054.896304] [<ffffffff81011cfe>] ? xen_do_hypervisor_callback+0x1e/0x30
[488054.896313]<EOI> [<ffffffff810093aa>] ? hypercall_page+0x3aa/0x1001
[488054.896330] [<ffffffff810093aa>] ? hypercall_page+0x3aa/0x1001
[488054.896343] [<ffffffff8100e160>] ?...
2017 May 21
2
Crash in CentOS 7 kernel-3.10.0-514.16.1.el7.x86_64 in Xen PV mode
...b>] ? kmem_cache_free+0x1bb/0x1f0
[ 32.304995] [<ffffffff8113079e>] handle_irq_event_percpu+0x3e/0x1e0
[ 32.305003] [<ffffffff8113097d>] handle_irq_event+0x3d/0x60
[ 32.305004] [<ffffffff81133647>] handle_edge_irq+0x77/0x130
[ 32.305004] [<ffffffff813d6217>] __xen_evtchn_do_upcall+0x227/0x350
[ 32.305004] [<ffffffff813d83c3>] xen_evtchn_do_upcall+0x33/0x50
[ 32.305004] [<ffffffff81698c7e>] xen_do_hypervisor_callback+0x1e/0x30
[ 32.305004] <EOI>
[ 32.305004] [<ffffffff811af916>] ? copy_pte_range+0x2b6/0x5a0
[ 32.305004] [<ffffffff811a...