Displaying 20 results from an estimated 100 matches similar to: "[PATCH v3] Clear IRQ_GUEST in irq_desc->status when setting action to NULL."
2008 Sep 26
2
RE: [Xen-changelog] [xen-unstable] x86: Properly synchronise updates to pirq-to-vector mapping.
@@ -491,16 +512,15 @@ int pirq_guest_bind(struct vcpu *v, int
int rc = 0;
cpumask_t cpumask = CPU_MASK_NONE;
+ WARN_ON(!spin_is_locked(&v->domain->evtchn_lock));
I find this WARN_ON() is triggered harmlessly when I assign device to HVM guest.
The call trace is XEN_DOMCTL_bind_pt_irq -> pt_irq_create_bind_vtd() -> pirq_guest_bind().
Should we
2006 Apr 19
0
[patch] define and use cpu_test_and_clear() and some type checking fixes
This patch defines a test_and_clear bitop for cpumask_t pointers.
Also fixes "wrong pointer type" for type specific bitops by using &foo
[0] instead of &foo.
NOTE: hard tabs are not my own :)
Signed-off-by: Jimi Xenidis <jimix@watson.ibm.com>
--
diff -r b3ca881c903b xen/include/xen/cpumask.h
--- a/xen/include/xen/cpumask.h Wed Apr 19 10:26:37 2006 -0400
+++
2008 Sep 23
9
Xen crash on dom0 shutdown
There is a BUG_ON() at xen/arch/x86/physdev.c:169 which appears to
be dependent upon guest behavior (should close event channel before
un-mapping pirq), rather than on internal hypervisor state. In 2.6.18,
this likely goes unnoticed because pci_device_shutdown() only calls all
the driver shutdown routines. In newer kernels, however, it also calls
pci_msi_shutdown() and pci_msix_shutdown(), which
2016 Jun 08
2
[PATCH] macvtap: fix bugon.cocci warnings
Use BUG_ON instead of a if condition followed by BUG.
Generated by: scripts/coccinelle/misc/bugon.cocci
CC: Mike Rapoport <rppt at linux.vnet.ibm.com>
Signed-off-by: Julia Lawall <julia.lawall at lip6.fr>
Signed-off-by: Fengguang Wu <fengguang.wu at intel.com>
---
macvtap.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
--- a/drivers/net/macvtap.c
+++
2016 Jun 08
2
[PATCH] macvtap: fix bugon.cocci warnings
Use BUG_ON instead of a if condition followed by BUG.
Generated by: scripts/coccinelle/misc/bugon.cocci
CC: Mike Rapoport <rppt at linux.vnet.ibm.com>
Signed-off-by: Julia Lawall <julia.lawall at lip6.fr>
Signed-off-by: Fengguang Wu <fengguang.wu at intel.com>
---
macvtap.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
--- a/drivers/net/macvtap.c
+++
2016 Jun 08
0
[PATCH] macvtap: fix bugon.cocci warnings
From: Julia Lawall <julia.lawall at lip6.fr>
Date: Wed, 8 Jun 2016 18:15:29 +0200 (CEST)
> Use BUG_ON instead of a if condition followed by BUG.
>
> Generated by: scripts/coccinelle/misc/bugon.cocci
>
> CC: Mike Rapoport <rppt at linux.vnet.ibm.com>
> Signed-off-by: Julia Lawall <julia.lawall at lip6.fr>
> Signed-off-by: Fengguang Wu <fengguang.wu at
2013 Jan 15
0
[PATCH v2 2/2] xen/arm: initialize the GIC irq properties of interrupts routed to guests
We are currently initializing GIC irq properties (ITARGETSR, IPRIORITYR,
and GICD_ICFGR) only in gic_route_irq, that is not called for guest
interrupts at all.
Move the initialization into a separate function
(gic_set_irq_properties) and call it from gic_route_irq_to_guest.
Changes in v2:
- rebased on 77d3a1db3196b1b5864469f8d3f41d496800c795.
Signed-off-by: Stefano Stabellini
2013 Nov 22
1
[PATCH v2 13/15] xen: arm: Add debug keyhandler to dump the physical GIC state.
Rename the existing gic_dump_info to gic_dump_info_guest reduce confusion.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
---
v2: s/gic_dump_info/gic_dump_info_guest/
---
xen/arch/arm/domain.c | 2 +-
xen/arch/arm/gic.c | 77 ++++++++++++++++++++++++++++++++++++++++++++-
xen/include/asm-arm/gic.h | 2 +-
3 files changed, 78 insertions(+), 3 deletions(-)
diff
2009 Jan 07
1
[PATCH 1/5] cpumask: update irq_desc to use cpumask_var_t
An embedded and charset-unspecified text was scrubbed...
Name: cpumask:update-irq_desc-to-use-cpumask_var_t.patch
Url: http://lists.linux-foundation.org/pipermail/virtualization/attachments/20090107/8ebe5843/attachment.txt
2009 Jan 07
1
[PATCH 1/5] cpumask: update irq_desc to use cpumask_var_t
An embedded and charset-unspecified text was scrubbed...
Name: cpumask:update-irq_desc-to-use-cpumask_var_t.patch
Url: http://lists.linux-foundation.org/pipermail/virtualization/attachments/20090107/8ebe5843/attachment.txt
2009 Jan 07
1
[PATCH 1/5] cpumask: update irq_desc to use cpumask_var_t
An embedded and charset-unspecified text was scrubbed...
Name: cpumask:update-irq_desc-to-use-cpumask_var_t.patch
Url: http://lists.linux-foundation.org/pipermail/virtualization/attachments/20090107/8ebe5843/attachment.txt
2013 Jun 26
24
Re: [XenARM] XEN tools for ARM with Virtualization Extensions
(moving to xen-devel, xen-arm is for the older PV ARM port)
On Tue, 2013-06-25 at 23:59 +0000, Eric Trudeau wrote:
> Hi, I am trying to build the XEN tools for our port of XEN to our
> Cortex A15-based platform.
>
> I am using the repo at git://xenbits.xenproject.org/xen.git to
> cross-compile the tools into our rootfs.
Which branch/changeset are you using?
I've heard that
2006 Jan 25
7
Xen reboots on booting
Hi, i have a problem with xen.
the output of uname is:Linux xen 2.6.12-gentoo-r6 #9 SMP Mon Jan 23 18:13:25
CET 2006 i686 AMD Opteron(tm) Processor 844 AuthenticAMD GNU/Linux
i user the SAME config of the kernel, for xen0 domain,
and when i boot with xen0 kernel it reboots
after this output...
.
.
.
ipt_recent v0.3.1: Stephen Frost <sfrost@snowman.net>.
2002 Dec 15
4
Mozilla nacking up to peek inside a vorbis file
Just been doing some simple phrases for Phoenix Online, uploaded the samples in q1 & q3 vorbis- when i click on the links in Mozilla, it opens the file in the window, displaying the files as text.
How could i change the html file i've linked them on so that when people click on the links, this won't happen?
http://galileo.spaceports.com/~djdij/po/index.html
code that works in Mozilla
2012 Feb 08
18
[PATCH 0 of 4] Prune outdated/impossible preprocessor symbols, and update VIOAPIC emulation
Patch 1 removes CONFIG_SMP
Patch 2 removes separate smp_{,r,w}mb()s as a result of patch 1
Patch 4 removes __ia64__ defines from the x86 arch tree
Patch 3 is related to patch 4 and changes the VIOAPIC to emulate
version 0x20 as a performance gain. It preceeds Patch 4 so as to be
more clear about the functional change.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
2008 Oct 02
0
[PATCH] linux: restrict IRQ probing
Since IRQ probing may touch all currently unused interrupts, we must
prevent probing for those where it doesn''t make sense (to avoid
triggering BUG()s or de-referencing NULL function pointers):
- dynamic IRQs must never be probed
- physical IRQs should only be probed when registered or identity-mapped
I haven''t got feedback from the reporting party, yet, but as the change
seems
2011 Sep 05
0
[PATCH] x86: remove unnecessary indirection from irq_complete_move()''s sole parameter
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/arch/x86/hpet.c
+++ b/xen/arch/x86/hpet.c
@@ -296,7 +296,7 @@ static void hpet_msi_ack(unsigned int ir
{
struct irq_desc *desc = irq_to_desc(irq);
- irq_complete_move(&desc);
+ irq_complete_move(desc);
move_native_irq(irq);
ack_APIC_irq();
}
--- a/xen/arch/x86/io_apic.c
+++ b/xen/arch/x86/io_apic.c
@@
2007 Apr 18
2
refactoring io_apic.c
OK, I need to do something like this to io_apic.c - split the hardware
specific parts out under mach-default, so we can override them for other
subarchitectures. It's not finished, needs header file and makefile
work. Would you be willing to take this if I do it? I'm not going to
bother if you're not, such refactorings are a pig to maintain out of
tree.
Frankly, io_apic.c needs a
2007 Apr 18
2
refactoring io_apic.c
OK, I need to do something like this to io_apic.c - split the hardware
specific parts out under mach-default, so we can override them for other
subarchitectures. It's not finished, needs header file and makefile
work. Would you be willing to take this if I do it? I'm not going to
bother if you're not, such refactorings are a pig to maintain out of
tree.
Frankly, io_apic.c needs a
2012 Mar 01
14
[PATCH 0 of 3] RFC Paging support for AMD NPT V2
There has been some progress, but still no joy. Definitely not intended for
inclusion at this point.
Tim, Wei, I added a Xen command line toggle to disable IOMMU and P2M table
sharing.
Tim, I verified that changes to p2m-pt.c don''t break shadow mode (64bit
hypervisor and Win 7 guest).
Hongkaixing, I incorporated your suggestion in patch 2, so I should add your
Signed-off-by eventually.