Displaying 17 results from an estimated 17 matches similar to: "Should shadow_lock be spin_lock_recursive?"
2009 Oct 23
11
soft lockups during live migrate..
Trying to migrate a 64bit PV guest with 64GB running medium to heavy load 
on xen 3.4.0, it is showing lot of soft lockups. The softlockups are 
causing dom0 reboot by the cluster FS. The hardware has 256GB and 32
CPUs.
Looking into the hypervisor thru kdb, I see one cpu in sh_resync_all()
while all other 31 appear spinning on the shadow_lock. I vaguely remember
seeing some thread on this while
2020 Sep 05
2
Possible AVX512 codegen bug in LLVM 10.0.1?
Hey LLVMDev,
Perhaps I'm missing something, but I think I've stumbled across a codegen
bug in LLVM 10.0.1 related to AVX512.  I've attached a small LLVM IR
testcase and generated x86_64 assembly file that shows the bug.
The test case is small, but not quite minimal, mostly because of driver
code included in the test case so one can compile and run the program.  The
program does a
2007 Sep 28
18
[makedumpfile] extract vmcoreinfo from /proc/vmcore for Xen
Hi,
--- background ----------------------------------------------------
* what the makedumpfile is:
  To shorten the size of the dumpfile and the time of creating the
  dumpfile, makedumpfile copies only the necessary pages for analysis
  to the dumpfile from /proc/vmcore. You can specify the kind of
  unnecessary pages with dump_level. If you want to shorten the size
  further, enable the
2005 Dec 08
0
[PATCH]Don''t unshadow current used shadow L2 table.
# HG changeset patch
# User Xiaofeng Ling <xiaofeng.ling@intel.com>
# Node ID cc6e19224d0b755d24358cd15d1a40f894d320b4
# Parent  b215584242c43415eccd008b90c812f3d04b398d
Don''t unshadow when the shadow l2 is the current used shadow table.
Otherwise, when destorying the domain, if the current sl2 is unpinned,
the shadow page will be freed without accquire the shadow_lock.
This may
2008 Feb 22
3
FW: [PATCH][UPDATE]Remove lock on guest table walk
Is there any trouble with mailing list? I didn''t see my mail sent back
after almost 8hrs. :-(
Thanks,
Kevin 
-----Original Message-----
From: Tian, Kevin 
Sent: 2008年2月22日 10:33
To: ''Tim Deegan''
Cc: xen-devel@lists.xensource.com
Subject: [PATCH][UPDATE]Remove lock on guest table walk
>From: Tim Deegan
>Sent: 2008年2月21日 22:13
>Hi,
>
>So, the idea seems
2012 Dec 05
1
Recursive locking in Xen (in reference to NMI/MCE path audit)
Hello,
While auditing the NMI/MCE paths, I have encountered some issues with
recursive locking in Xen, discovered by the misuse of the console_lock
intermittently as a regular lock and as a recursive lock.
The comment in spinlock.h is unclear as to whether mixing recursive and
non recursive calls on the same spinlock is valid.  If the calls are
genuinely not valid, then surely regular spinlocks
2006 Sep 29
0
[PATCH 2/6] xen: add per-node bucks to page allocator
This patch adds a per-node bucket to the heap structure in Xen.  During
heap initialization the patch determines which bucket to place the
memory.  We reserve guard pages between node boundaries in the case that
said boundary isn''t already guarded by the MAX_ORDER boundary to prevent
the buddy allocator from merging pages between nodes.
-- 
Ryan Harper
Software Engineer; Linux Technology
2013 Aug 16
7
[PATCH v2] xen/console: buffer and show origin of guest PV writes
Guests other than domain 0 using the console output have previously been
controlled by the VERBOSE define, but with no designation of which
guest''s output was on the console. This patch converts the HVM output
buffering to be used by all domains, line buffering their output and
prefixing it with the domain ID. This is especially useful for debugging
stub domains.
Signed-off-by: Daniel De
2013 Nov 25
22
[PATCH v3 00/13] xen: arm initial support for xgene arm64 platform
George has release acked all of these. Otherwise mostly minor updates
this time around.
Summary: A == acked, M == modified
A   xen: arm64: Add 8250 earlyprintk support
A   xen: arm64: Add Basic Platform support for APM X-Gene Storm.
A   xen: arm64: Add APM implementor id to processor implementers.
 M  xen: arm: add a quirk to handle platforms with unusual GIC layout
A   xen: arm: allow platform
2013 Sep 09
0
[PATCH v3] xen/console: buffer and show origin of guest PV writes
Guests other than domain 0 using the console output have previously been
controlled by the VERBOSE #define, but with no designation of which
guest''s output was on the console. This patch converts the HVM output
buffering to be used by all domains except the hardware domain (dom0):
stripping non-printable characters, line buffering the output, and
prefixing it with the domain ID. This is
2010 Nov 04
4
Bug#602378: xen-hypervisor-4.0-amd64: Live migration of Guests crashes and reboots
Package: xen-hypervisor-4.0-amd64
Version: 4.0.1-1
Severity: grave
Tags: squeeze sid
Justification: causes non-serious data loss
Live migration of a guest (running CentOS 5.5, Paravirtualized) crashes the target-host
(Hardware: Dell R610, 2x Xeon 5620, 16Gb RAM, Perc/700-Raid)
(XEN) ----[ Xen-4.0.1  x86_64  debug=n  Not tainted ]----
(XEN) CPU:    9
(XEN) RIP:    e008:[<ffff82c4801151f6>]
2013 Jan 21
6
[PATCH v3 0/4] nested vmx: enable VMCS shadowing feature
Changes from v2 to v3:
 - Use pfn_to_paddr() to get the address from frame number instead of doing shift directly.
 - Remove some unnecessary initialization code and add "static" to vmentry_fields and gpdptr_fields.
 - Enable the VMREAD/VMWRITE bitmap only if nested hvm is enabled.
 - Use clear_page() to set all 0 to the page instead of memset().
 - Use domheap to allocate the
2013 Nov 20
54
[PATCH+RFC+HACK 00/16] xen: arm initial support for xgene arm64 platform
I''m afraid this series is rather a grab bag and it is distressingly
large at this stage. With this series I can boot an Xgene board until it
fails to find its SATA controller. This is a dom0 issue for which
patches are pending from APM (/me nudges Anup).
As well as the APM specific platform stuff there are also some generic
improvements which were either necessary or useful during this
2013 Feb 21
2
[PATCH v3] x86/nhvm: properly clean up after failure to set up all vCPU-s
Otherwise we may leak memory when setting up nHVM fails half way.
This implies that the individual destroy functions will have to remain
capable (in the VMX case they first need to be made so, following
26486:7648ef657fe7 and 26489:83a3fa9c8434) of being called for a vCPU
that the corresponding init function was never run on.
Once at it, also remove a redundant check from the corresponding
2012 Nov 15
1
[RFC/PATCH v4] XENMEM_claim_pages (subop of existing) hypercall
This is a fourth cut of the hypervisor patch of the proposed
XENMEM_claim_pages hypercall/subop, taking into account
feedback from Jan and Keir and IanC, plus some fixes found
via runtime debugging (using privcmd only) and some
added comments/cleanup.
[Logistical note: I will be out tomorrow (Friday) plus US
holidays next week so my responsiveness to comments may be
slower for awhile. --djm]
2012 Dec 12
2
[PATCH v7 1/2] xen: unify domain locking in domctl code
These two patches were originally part of the XSM series that I have
posted, and remain prerequisites for that series. However, they are
independent of the XSM changes and are a useful simplification
regardless of the use of XSM.
The Acked-bys on these patches were provided before rebasing them over
the copyback changes in 26268:1b72138bddda, which had minor conflicts
that I resolved.
[PATCH
2011 Jul 21
51
Linux Stubdom Problem
2011/7/19 Stefano Stabellini <stefano.stabellini@eu.citrix.com>:
> CC''ing Tim and xen-devel
>
> On Mon, 18 Jul 2011, Jiageng Yu wrote:
>> 2011/7/16 Stefano Stabellini <stefano.stabellini@eu.citrix.com>:
>> > On Fri, 15 Jul 2011, Jiageng Yu wrote:
>> >> 2011/7/15 Jiageng Yu <yujiageng734@gmail.com>:
>> >> > 2011/7/15