Displaying 20 results from an estimated 5000 matches similar to: "IO_APIC in para-guest"
2012 Oct 02
0
Booting Xen 4.1.3 Dom0 hangs with PANIC on CPU 6: Xen BUG at io_apic.c:129
Hi all,
I have searched the net and haven''t found a good answer so I hope perhaps someone here can help.
I have an IBM x3850 (8863) that I am upgrading from SLES11SP1 to SLES11SP2, and at the same time XEN is being upgraded as part of the distro. The server is used as a Xen host for up to 6 guests.
Anyway, the server boots fine with the SLES11SP2 default kernel, and the trace
2009 Aug 25
1
[PATCH] XEN: remove undefined functions
mk_pirq_info(), gsi_from_irq() and vector_from_irq() are static functions
and no one is calling them.
This fixed following compilation warnings :
drivers/xen/events.c:134: warning: ?mk_pirq_info? defined but not used
drivers/xen/events.c:180: warning: ?gsi_from_irq? defined but not used
drivers/xen/events.c:190: warning: ?vector_from_irq? defined but not used
Signed-off-by: Jaswinder
2009 Aug 25
1
[PATCH] XEN: remove undefined functions
mk_pirq_info(), gsi_from_irq() and vector_from_irq() are static functions
and no one is calling them.
This fixed following compilation warnings :
drivers/xen/events.c:134: warning: ?mk_pirq_info? defined but not used
drivers/xen/events.c:180: warning: ?gsi_from_irq? defined but not used
drivers/xen/events.c:190: warning: ?vector_from_irq? defined but not used
Signed-off-by: Jaswinder
2009 Aug 25
1
[PATCH] XEN: remove undefined functions
mk_pirq_info(), gsi_from_irq() and vector_from_irq() are static functions
and no one is calling them.
This fixed following compilation warnings :
drivers/xen/events.c:134: warning: ?mk_pirq_info? defined but not used
drivers/xen/events.c:180: warning: ?gsi_from_irq? defined but not used
drivers/xen/events.c:190: warning: ?vector_from_irq? defined but not used
Signed-off-by: Jaswinder
2008 Sep 26
2
RE: [Xen-changelog] [xen-unstable] x86: Properly synchronise updates to pirq-to-vector mapping.
@@ -491,16 +512,15 @@ int pirq_guest_bind(struct vcpu *v, int
int rc = 0;
cpumask_t cpumask = CPU_MASK_NONE;
+ WARN_ON(!spin_is_locked(&v->domain->evtchn_lock));
I find this WARN_ON() is triggered harmlessly when I assign device to HVM guest.
The call trace is XEN_DOMCTL_bind_pt_irq -> pt_irq_create_bind_vtd() -> pirq_guest_bind().
Should we
2008 Nov 13
69
[PATCH 00 of 38] xen: add more Xen dom0 support
Hi Ingo,
Here''s the chunk of patches to add Xen Dom0 support (it''s probably
worth creating a new xen/dom0 topic branch for it).
A dom0 Xen domain is basically the same as a normal domU domain, but
it has extra privileges to directly access hardware. There are two
issues to deal with:
- translating to and from the domain''s pseudo-physical addresses and
real machine
2012 Apr 25
2
[PATCH] xen: use the pirq number to check the pirq_eoi_map
In pirq_check_eoi_map use the pirq number rather than the Linux irq
number to check whether an eoi is needed in the pirq_eoi_map.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Tested-by: Tobias Geiger <tobias.geiger@vido.info>
---
drivers/xen/events.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/xen/events.c
2008 Sep 23
9
Xen crash on dom0 shutdown
There is a BUG_ON() at xen/arch/x86/physdev.c:169 which appears to
be dependent upon guest behavior (should close event channel before
un-mapping pirq), rather than on internal hypervisor state. In 2.6.18,
this likely goes unnoticed because pci_device_shutdown() only calls all
the driver shutdown routines. In newer kernels, however, it also calls
pci_msi_shutdown() and pci_msix_shutdown(), which
2007 Jun 05
13
about VIRQ & PIRQ
about VIRQ & PIRQ
what is VIRQ ?How VIRQ is different from PIRQ ?How VIRQ & PIRQ are related each other ?
DISCLAIMER:
-----------------------------------------------------------------------------------------------------------------------
The contents of this e-mail and any attachment(s) are confidential and intended for the named recipient(s) only.
It shall not attach any
2011 Sep 21
0
[PATCH] x86: IO-APIC code has no dependency on PCI
The IRQ handling code requires pcidevs_lock to be held only for MSI
interrupts.
As the handling of which was now fully moved into msi.c (i.e. while
applying fine without, the patch needs to be applied after the one
titled "x86: split MSI IRQ chip"), io_apic.c now also doesn''t need to
include PCI headers anymore.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
2008 Oct 02
0
[PATCH] linux: restrict IRQ probing
Since IRQ probing may touch all currently unused interrupts, we must
prevent probing for those where it doesn''t make sense (to avoid
triggering BUG()s or de-referencing NULL function pointers):
- dynamic IRQs must never be probed
- physical IRQs should only be probed when registered or identity-mapped
I haven''t got feedback from the reporting party, yet, but as the change
seems
2010 Aug 19
0
[PATCH] arch/x86/kernel/apic/io_apic.c: Fix for crash when apic=debug is used
Hi,
Here is the patch fixing crash when apic=debug
is used and APIC is not properly initialized.
This issue appears during Xen Dom0 kernel boot
(git://git.kernel.org/pub/scm/linux/kernel/git/jeremy/xen.git,
xen/stable-2.6.32.x head), however I think that
patch is rather generic and should be applied
to mainline kernel (it applies to Linux Kernel
Ver. 2.6.35 and Ver. 2.6.32.19 with small fuzz).
2012 Mar 29
2
BUG: soft lockup - CPU#0 stuck for 61s!
Ian,
I came across the subject line on a 96GB server with over 85 VMs running.
Completely frozen and unresponsive, qemu-dm processes hung on event
channels. I''m using the XenServer 6.0 dom0 kernel on top of the
xen-unstable tip hypervisor.
I believe you solved the issue backporting some event channel patches to
the 2.6.32 kernel, as described in this thread
2011 Sep 20
0
[PATCH 4/4] x86: split MSI IRQ chip
With the .end() accessor having become optional and noting that
several of the accessors'' behavior really depends on the result of
msi_maskable_irq(), the splits the MSI IRQ chip type into two - one
for the maskable ones, and the other for the (MSI only) non-maskable
ones.
At once the implementation of those methods gets moved from io_apic.c
to msi.c.
Signed-off-by: Jan Beulich
2011 May 09
1
Bug#625438: [PATCH] xen: ioapic: avoid gcc 4.6 warnings about uninitialised variables
# HG changeset patch
# User Ian Campbell <ian.campbell at citrix.com>
# Date 1304937815 -3600
# Node ID 35abcbcdf8bcabab6e0bbd929f69b613e167edfd
# Parent 4b0692880dfa557d4e1537c7a58c412c1286a416
xen: ioapic: avoid gcc 4.6 warnings about uninitialised variables
gcc 4.6 complains:
io_apic.c: In function 'restore_IO_APIC_setup':
2011 May 09
1
Bug#625438: [PATCH] xen: ioapic: avoid gcc 4.6 warnings about uninitialised variables
# HG changeset patch
# User Ian Campbell <ian.campbell at citrix.com>
# Date 1304937815 -3600
# Node ID 35abcbcdf8bcabab6e0bbd929f69b613e167edfd
# Parent 4b0692880dfa557d4e1537c7a58c412c1286a416
xen: ioapic: avoid gcc 4.6 warnings about uninitialised variables
gcc 4.6 complains:
io_apic.c: In function 'restore_IO_APIC_setup':
2013 May 08
11
[PATCH 1/2] xen, libxc: init msix addr/data with value from qemu via hypercall
Accelerated msix entry is initialized to zero when msixtbl_pt_register is
called. This doesn''t match the value from qemu side, although pirq may already
be mapped and binded in qemu side. Kernel will get wrong value when reading
msix info.
Signed-off-by: Zhenzhong Duan <zhenzhong.duan@oracle.com>
Tested-by: Yuval Shaia <yuval.shaia@oracle.com>
---
tools/libxc/xc_domain.c
2011 Jul 07
6
Xen unstable on NetBSD
Hello,
I''m trying to compile Xen unstable on NetBSD, I''ve aplied the patches
from http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/sysutils/xentools41/patches/?only_with_tag=MAIN
and copied the blk files from
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/sysutils/xentools41/files/?only_with_tag=MAIN
(I don''t know which of these patches have been applied to xen
unstable, so
2013 Apr 26
6
ubuntu13.04 host and ubuntu13.04 guest how to config the pvscsi
Hi, everyone!
We google a lot, but can''t find how to config the pvscsi on our ubuntu13.04 PV on HVM.There are some links
http://wiki.xen.org/wiki/Paravirtualized_SCSI
http://wiki.xen.org/wiki/Xen_Configuration_File_Options
And we use the config option above
Configure PVSCSI devices
vscsi = [ ''/dev/sdc, 0:0:0:0'' ]
I pass sdc to the hvm, but in our pvhvm (ubuntu13.04)
2013 May 21
12
[PATCH] fix XSA-46 regression with xend/xm
The hypervisor side changes for XSA-46 require the tool stack to now
always map the guest pIRQ before granting access permission to the
underlying host IRQ (GSI). This in particular requires that pciif.py
no longer can skip this step (assuming qemu would do it) for HVM
guests.
This in turn exposes, however, an inconsistency between xend and qemu:
The former wants to always establish 1:1 mappings