Displaying 20 results from an estimated 700 matches similar to: "[PATCH] Patches to free MSI vector when pirq unmapped"
2008 Sep 26
2
RE: [Xen-changelog] [xen-unstable] x86: Properly synchronise updates to pirq-to-vector mapping.
@@ -491,16 +512,15 @@ int pirq_guest_bind(struct vcpu *v, int
int rc = 0;
cpumask_t cpumask = CPU_MASK_NONE;
+ WARN_ON(!spin_is_locked(&v->domain->evtchn_lock));
I find this WARN_ON() is triggered harmlessly when I assign device to HVM guest.
The call trace is XEN_DOMCTL_bind_pt_irq -> pt_irq_create_bind_vtd() -> pirq_guest_bind().
Should we
2010 Feb 26
0
[Xen-devel] Crash during boot in Debian lenny default dom0 kernel (2.6.26-2-xen-686) / bugfix patch
Hello,
More information and a patch for the bug.
-- Pasi
----- Forwarded message from George Dunlap <George.Dunlap at eu.citrix.com> -----
From: George Dunlap <George.Dunlap at eu.citrix.com>
To: Jan Beulich <JBeulich at novell.com>
Cc: Sander Eikelenboom <linux at eikelenboom.it>,
Jeremy Fitzhardinge <jeremy at goop.org>,
Yunhong Jiang <yunhong.jiang at
2008 Mar 27
11
[PATCH 1/5] Add MSI support to XEN
This patch changes the pirq to be per-domain in xen tree.
Signed-off-by: Jiang Yunhong <yunhong.jiang@intel.com>
Signed-off-by: Shan Haitao <haitao.shan@intel.com>
Best Regards
Shan Haitao
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2012 Apr 25
2
[PATCH] xen: use the pirq number to check the pirq_eoi_map
In pirq_check_eoi_map use the pirq number rather than the Linux irq
number to check whether an eoi is needed in the pirq_eoi_map.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Tested-by: Tobias Geiger <tobias.geiger@vido.info>
---
drivers/xen/events.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/xen/events.c
2008 Mar 27
21
[PATCH 0/5] Add MSI support to XEN
Hi, Keir,
These patches are rebased version of Yunhong''s original patches,
which were sent out before XEN 3.2 was released. These patches enable
MSI support and limited MSI-X support in XEN. Here is the original
description of the patches from Yunhong''s mail.
The basic idea including:
1) Keep vector global resource owned by xen, while split pirq into
per-domain
2007 Jun 05
13
about VIRQ & PIRQ
about VIRQ & PIRQ
what is VIRQ ?How VIRQ is different from PIRQ ?How VIRQ & PIRQ are related each other ?
DISCLAIMER:
-----------------------------------------------------------------------------------------------------------------------
The contents of this e-mail and any attachment(s) are confidential and intended for the named recipient(s) only.
It shall not attach any
2011 Sep 01
4
[xen-unstable test] 8803: regressions - FAIL
flight 8803 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/8803/
Regressions :-(
Tests which did not succeed and are blocking:
test-amd64-i386-rhel6hvm-intel 4 xen-install fail REGR. vs. 8769
test-amd64-i386-xl 4 xen-install fail REGR. vs. 8769
test-amd64-i386-pair 6 xen-install/dst_host fail REGR. vs. 8769
2006 Feb 28
0
RE: Re: [PATCH] Fix qemu-dm segfault when multiple HVMdomains
So, Keir, can you please check in this patch?
Thanks
Yunhong Jiang
>-----Original Message-----
>From: xen-devel-bounces@lists.xensource.com
>[mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of
>John Clemens
>Sent: Tuesday, February 28, 2006 1:35 AM
>To: Jiang, Yunhong
>Cc: Li, Xin B; xen-devel@lists.xensource.com
>Subject: [Xen-devel] Re: [PATCH] Fix qemu-dm
2006 Jul 31
0
[PATCH] Fix gdtr access on vmxassist
Hi, Keir:
the gdtr information in oldctx is an address for guest, not for
vmxassist. When access descriptor on guest gdt, we need to go through
guest page table if guest enable paging. This error may happen if guest
enable PE/PG in one instruction.
This patch fix this issue.
Signed-off-by: Yunhong Jiang <yunhong.jiang@intel.com>
Signed-off-by: Xin Li <xin.b.li@intel.com>
Thanks
2005 Jul 21
0
[PATCH]Propagate guest MSR writes to machine MSRs immediately
Propagate guest MSR writes to machine MSRs immediately
Right now, we have an exposure between the time the MSR is written
and used by an instruction such as syscall. If there is a context
switch and we do vmx_do_restore_msrs(), everything goes fine. But
if we don''t, then we execute the syscall with the wrong MSR.
Signed-off-by: Yunhong Jiang <yunhong.jiang@intel.com>
2005 Sep 28
0
[PATCH][VT] Fix the mmio for cmp/test opcode
Currently the mmio_operands assumes writing to memory when operand 0 is
register or immediate, this is false for cmp/test opcode.
This patch resolve this problem, please review.
Signed-off-by: Yunhong Jiang <yunhong.jiang@intel.com>
Signed-off-by: Jun Nakajima <jun.nakajima@intel.com>
Thanks
Yunhong Jiang
_______________________________________________
Xen-devel mailing list
2012 Sep 05
1
[PATCH 0/2] PHYSDEVOP_get_free_pirq adjustments
Issues noticed during recent fixing of security problems.
1: x86: drop "index" parameter from get_free_pirq()
2: x86: fix RCU locking in PHYSDEVOP_get_free_pirq
Signed-off-by: Jan Beulich <jbeulich@suse.com>
2008 Sep 23
9
Xen crash on dom0 shutdown
There is a BUG_ON() at xen/arch/x86/physdev.c:169 which appears to
be dependent upon guest behavior (should close event channel before
un-mapping pirq), rather than on internal hypervisor state. In 2.6.18,
this likely goes unnoticed because pci_device_shutdown() only calls all
the driver shutdown routines. In newer kernels, however, it also calls
pci_msi_shutdown() and pci_msix_shutdown(), which
2006 Oct 30
1
RE: [Patch][RESEND] Add hardware CR8 acceleration for TPRaccessing
Any advice about the patch cr8-acceleration-3.patch?
Hi Keir, could you give some comments? Thanks!
-- Dexuan
-----Original Message-----
From: xen-devel-bounces@lists.xensource.com [mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Cui, Dexuan
Sent: 2006年10月25日 11:12
To: Keir.Fraser@cl.cam.ac.uk
Cc: xen-devel@lists.xensource.com
Subject: [Xen-devel] [Patch][RESEND] Add hardware CR8
2011 Sep 07
10
[PATCH] IRQ: Group IRQ_MOVE_CLEANUP_VECTOR with other hypervisor IPIs
Also, rename to MOVE_CLEANUP_VECTOR to be in line with the other IPI
names.
This requires bumping LAST_HIPRIORITY_VECTOR, but does mean that the
range FIRST-LAST_HIPRIORITY_VECTORs are free once again.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
diff -r 0268e7380953 -r c7884dbb6f7d xen/arch/x86/apic.c
--- a/xen/arch/x86/apic.c Mon Sep 05 15:10:28 2011 +0100
+++
2008 Nov 21
0
[patch 5/7][PCIE-AER]Enable PCIE-AER support for XEN
Patch 5 modify_pci: it provides small fix of aerdrv_core, add one new func of get_device by BDF
Signed-off-by: Jiang Yunhong<yunhong.jiang@intel.com>
Signed-off-by: Ke Liping<liping.ke@intel.com>
Thanks& Regards,
Criping
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2008 Apr 30
0
[PATCH 5/6] Add MSI support to XEN
This patch add MSI support to passthrough HVM domain.
Currently it only inercept access to MSI config space, no MSI-x support.
Signed-off-by: Jiang Yunhong <yunhong.jiang@intel.com>
Signed-off-by: Shan Haitao <haitao.shan@intel.
<<msi_passthrough.patch>> com>
Best Regards
Haitao Shan
_______________________________________________
Xen-devel mailing list
2006 Jul 29
0
[PATCH] build p2m mapping according to m2p mapping
build p2m mapping according to m2p mapping.
Signed-off-by: Xin Li <xin.b.li@intel.com>
Signed-off-by: Yunhong Jiang <yunhong.jiang@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2005 Jul 04
0
[PATCH] MSR save/restore for x86_64 VMX domains
To avoid MSR save/restore at every VM exit/entry time, we restore the
x86_64 specific MSRs at domain switch time if modified. In VMX domains,
we modify those upon requests from the guests to that end. Note that
IA32_EFER.LME and IA32_EFER.LMA are saved/restored by H/W on every VM
exit. For the usual domains (i.e. dom0 and domU), those MSRs are not
modified once set at initialization time, so we
2005 Sep 14
0
RE: [PATCH][VT] Clear the pending interrupt on sharedpage when PIC initialized
Keir Fraser wrote:
> On 13 Sep 2005, at 03:40, Jiang, Yunhong wrote:
>
>> 1) I think the cpu_reset_interrupt() is a common API on qemu for
>> hardware interrupt/exception etc,while clear the shared page is just
>> for hardware interrupt. Of course, this function is currently used
>> just for hardware interrupt since qemu works as a device model :)
>> But