Displaying 20 results from an estimated 700 matches similar to: "[PATCH] xen pvhvm: do not remap pirqs onto evtchns if !xen_have_vector_callback"
2013 Aug 16
1
[PATCH] xen: initialize xen panic handler for PVHVM
kernel use callback linked in panic_notifier_list to notice others when panic
happens.
NORET_TYPE void panic(const char * fmt, ...){
...
atomic_notifier_call_chain(&panic_notifier_list, 0, buf);
}
When xen aware this, it will call xen_reboot(SHUTDOWN_crash) to send out an
event with reason code - SHUTDOWN_crash.
xen_panic_handler_init() is defined to register on panic_notifier_list but
2013 Aug 16
1
[PATCH] xen: initialize xen panic handler for PVHVM
kernel use callback linked in panic_notifier_list to notice others when panic
happens.
NORET_TYPE void panic(const char * fmt, ...){
...
atomic_notifier_call_chain(&panic_notifier_list, 0, buf);
}
When xen aware this, it will call xen_reboot(SHUTDOWN_crash) to send out an
event with reason code - SHUTDOWN_crash.
xen_panic_handler_init() is defined to register on panic_notifier_list but
2013 Aug 16
1
[PATCH] xen: initialize xen panic handler for PVHVM
kernel use callback linked in panic_notifier_list to notice others when panic
happens.
NORET_TYPE void panic(const char * fmt, ...){
...
atomic_notifier_call_chain(&panic_notifier_list, 0, buf);
}
When xen aware this, it will call xen_reboot(SHUTDOWN_crash) to send out an
event with reason code - SHUTDOWN_crash.
xen_panic_handler_init() is defined to register on panic_notifier_list but
2011 Oct 31
5
Xen 4.1.1 HVM guest cdrom trouble, lost interrupts, ata failed commands (frozen)
Hello,
I was testing Fedora 16 (rc2) Xen host, with included Xen 4.1.1 rpms
and Linux 3.1.0 dom0 kernel. Fedora 16 PV domUs seem to work nicely.
I noticed a problem with Fedora 16 Xen HVM guests though.
The F16 guest kernel (Linux 3.1.0) fails with the qemu-dm emulated DVD-ROM drive..
Full HVM guest kernel dmesg attached to this email.
See the end of this email for Xen cfgfile for the
2013 Feb 26
4
passthroughed msix device
Hi maintainer,
Reprodue an bug on xen-unstable, it''s an irq affinity issue for
passthroughed msix device to uek1 pvhvm(2.6.32 stable).
I passthrough two mptsas devices(0000:0d:0.0, 0000:1f:0.0) to a pvhvm,
irq affinity can''t be changed.
Step to reproduce is as below:
1. xl -f pci-assignable-add 0000:0d:0.0; xl -f pci-assignable-add
0000:1f:0.0
2.xm cr -c vm.cfg
2012 Oct 04
49
[RFC 00/14] arm: implement ballooning and privcmd foreign mappings based on x86 PVH
This series implements ballooning for Xen on ARM and builds and Mukesh''s
PVH privcmd stuff to implement foreign page mapping on ARM, replacing
the old "HACK: initial (very hacky) XENMAPSPACE_gmfn_foreign" patch.
The baseline is a bit complex, it is basically Stefano''s xenarm-forlinus
branch (commit bbd6eb29214e) merged with Konrad''s linux-next-pvh branch
2013 Jan 28
16
PVH questions
Hello,
I''ve had a look at PVH support, and I have a few questions:
- events are still dispatched the PV way through the callback, right?
- I guess FPU errors don''t trigger an INT13, so I don''t need to handle
that?
- How about the console and store MFNs from the boot info? Are they
still MFNs, or actually PFNs?
- How about PV network in non-copy mode? It used to be
2013 May 16
5
xc_map_foreign_bulk() memory leak in ARM version?
Hi Xen folks!
I''ve faced with one strange thing in ARM version of Xen: when I use
xc_map_foreign_bulk() to map some memory from domU to dom0, after unmap()
for previous returned address - memory is not freed at all.
Let''s look at call stack:
xc_map_foreign() ->
linux_privcmd_map_foreign_bulk() ->
{
addr = mmap(fd);
ioctl(fd, IOCTL_PRIVCMD_MMAPBATCH_V2 );
2012 Oct 17
1
[PATCH 1/6] xen: balloon: allow PVMMU interfaces to be compiled out
The ARM platform has no concept of PVMMU and therefor no
HYPERVISOR_update_va_mapping et al. Allow this code to be compiled out
when not required.
In some similar situations (e.g. P2M) we have defined dummy functions
to avoid this, however I think we can/should draw the line at dummying
out actual hypercalls.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
---
arch/x86/xen/Kconfig
2012 Apr 10
7
[PATCH v3 1/2] xen: enter/exit lazy_mmu_mode around m2p_override calls
This patch is a significant performance improvement for the
m2p_override: about 6% using the gntdev device.
Each m2p_add/remove_override call issues a MULTI_grant_table_op and a
__flush_tlb_single if kmap_op != NULL. Batching all the calls together
is a great performance benefit because it means issuing one hypercall
total rather than two hypercall per page.
If paravirt_lazy_mode is set
2014 Feb 27
3
[PATCH] xen/grant-table: Refactor gnttab_[un]map_refs to avoid m2p_override
(This is a continuation of "[PATCH v9] xen/grant-table: Avoid m2p_override
during mapping")
The grant mapping API does m2p_override unnecessarily: only gntdev needs it,
for blkback and future netback patches it just cause a lock contention, as
those pages never go to userspace. Therefore this series does the following:
- the bulk of the original function (everything after the mapping
2014 Feb 27
3
[PATCH] xen/grant-table: Refactor gnttab_[un]map_refs to avoid m2p_override
(This is a continuation of "[PATCH v9] xen/grant-table: Avoid m2p_override
during mapping")
The grant mapping API does m2p_override unnecessarily: only gntdev needs it,
for blkback and future netback patches it just cause a lock contention, as
those pages never go to userspace. Therefore this series does the following:
- the bulk of the original function (everything after the mapping
2011 Mar 11
2
[GIT PULL stable-2.6.32.x] PV on HVM fixes
Hi Jeremy,
I backported the branch I have in linux-next plus some older PV on HVM
fixes to stable-2.6.32.x.
Please pull:
git://xenbits.xen.org/people/sstabellini/linux-pvhvm.git stable-2.6.32-pvhvm
Ian Campbell (11):
xen: do not respond to unknown xenstore control requests
xen: use new schedop interface for suspend
xen: switch to new schedop hypercall by default.
xen:
2011 Sep 01
3
HVM guests and pvlocks not working as expected
After much joy with this, I thought I post this to a bigger audience. After
having migrated to Xen 4.1.1, booting HVM guests had several issues. Some
related to interrupts not being set up correctly (which Stefano has posted
patches) and even with those 3.0 guests seem to hang for me while 2.6.38 or
older kernels were ok.
After digging deeply into this, I think I found the issue. However, if that
2013 Aug 27
1
[PATCH] xen/balloon: don't set P2M entry for auto translated guest
In commit cd9151e2: xen/balloon: set a mapping for ballooned out pages
we have the ballooned out page''s mapping set to a scratch page.
That commit also sets the P2M entry of ballooned out page to the scratch
page''s MFN. This is necessary for PV guest but not for HVM guest. On the
other hand, setting the P2M entry would trigger BUG_ON in
__set_phys_to_machine.
The correct thing
2013 Oct 17
42
[PATCH v8 0/19] enable swiotlb-xen on arm and arm64
Hi all,
this patch series enables xen-swiotlb on arm and arm64.
It has been heavily reworked compared to the previous versions in order
to achieve better performances and to address review comments.
We are not using dma_mark_clean to ensure coherency anymore. We call the
platform implementation of map_page and unmap_page.
We assume that dom0 has been mapped 1:1 (physical address ==
machine
2012 Jan 06
3
[PATCH] xen: remove CONFIG_XEN_DOM0 compile option
XEN_DOM0 is a silent option that has been automatically selected when
CONFIG_XEN is selected since 6b0661a5e6fbf. If this option was changed
to a menu configurable option then it would only give users the ability
to compile out about 100 kbytes of code. As that option makes little
sense to choose, and the option isn''t menu selectable anyway, then we
can clean up some code by simply
2012 Jan 06
3
[PATCH] xen: remove CONFIG_XEN_DOM0 compile option
XEN_DOM0 is a silent option that has been automatically selected when
CONFIG_XEN is selected since 6b0661a5e6fbf. If this option was changed
to a menu configurable option then it would only give users the ability
to compile out about 100 kbytes of code. As that option makes little
sense to choose, and the option isn''t menu selectable anyway, then we
can clean up some code by simply
2012 Jan 06
3
[PATCH] xen: remove CONFIG_XEN_DOM0 compile option
XEN_DOM0 is a silent option that has been automatically selected when
CONFIG_XEN is selected since 6b0661a5e6fbf. If this option was changed
to a menu configurable option then it would only give users the ability
to compile out about 100 kbytes of code. As that option makes little
sense to choose, and the option isn''t menu selectable anyway, then we
can clean up some code by simply
2013 Sep 19
3
[PATCH] xen/balloon: don't alloc page while non-preemptible
From: David Vrabel <david.vrabel@citrix.com>
get_balloon_scratch_page() disables preemption so we cannot call
alloc_page() in between get/put_balloon_scratch_page(). Shuffle bits
around in decrease_reservation() to avoid this.
Signed-off-by: David Vrabel <david.vrabel@citrix.com>
---
drivers/xen/balloon.c | 23 +++++++++++------------
1 files changed, 11 insertions(+), 12